Analysis
-
max time kernel
51s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
Facturas Pagadas.exe
Resource
win7-20241010-en
General
-
Target
Facturas Pagadas.exe
-
Size
536KB
-
MD5
ad3b7a36fc62bf369b5c563d2b5db945
-
SHA1
3e43c14f9e010f1bcdcce6618f9ca5503de08579
-
SHA256
af0af3ebf3ac231ad77dbe4cbfa0fb2d48312d4ca0b5431081046ab09aa3b552
-
SHA512
2de28e6d8dff912a57e958ddeea51876cbd10e448221807837b6ba6a592acc70434d3be7f1695e3651ea6c2483d0cb3220be96f5e93b1be3f5234b1e5060e811
-
SSDEEP
12288:9IdemtiK5oBfZQElcqE+RqFoVnQ1PSYNsEOmuBE6rp:V+FoBfDcqE+4FInqPSzmf6rp
Malware Config
Extracted
formbook
4.1
g4m1
detect-guide.fyi
ethmetaverse.info
21centmasks.com
statemint.network
decowonderland.com
phairrealty.com
drhillda.com
wir-koennen-gesund.info
m-cloudplatform.com
baduapp.site
trydextrus.com
unlimiteddecorations.com
zagfundraisong.com
gaincapita.com
przemekkulik.online
joshwiliam.online
k8worldcup94.com
soobanhaider.com
dein-hochzeitsladen.com
chirpvision.com
63056.xyz
uhuhuhu.xyz
haltingqwegrj.xyz
wrappedsportscards.com
dresslikeasalesboss.com
lonestarstaggrips.com
andrymoraleswebsite.com
hbxgjg.com
cufon.xyz
zhangyunan.xyz
brisbanecpa.com
staphynbcb.store
lora2matter.site
guwanmaimai.com
zr355.com
lifecoaching.tours
progressiq.net
electricwatertoys.com
chinacityfund.com
shopcelularmx.com
asteya-shop.com
holidayresort.online
millibruce.com
atlasecomarket.com
whataremydivorcerights.com
e-servismerkez.com
sechsy.com
1stpersonteam.com
apexbusinesssystems.com
szlvling.com
bankonthemoon.com
blxsch.com
infinityexpander.com
ytdqbj.com
mercadopapaya.com
nftw.fund
remedialpax.com
ds8r8ugy.xyz
enlightenedmonkeystudios.com
1dingljd.xyz
lakeview5321.com
katezarb.com
jamesanthonymurphy.com
luyenn.store
kaixin332.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2904-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 972 set thread context of 2904 972 Facturas Pagadas.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2904 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Facturas Pagadas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Facturas Pagadas.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 972 wrote to memory of 2904 972 Facturas Pagadas.exe 30 PID 972 wrote to memory of 2904 972 Facturas Pagadas.exe 30 PID 972 wrote to memory of 2904 972 Facturas Pagadas.exe 30 PID 972 wrote to memory of 2904 972 Facturas Pagadas.exe 30 PID 972 wrote to memory of 2904 972 Facturas Pagadas.exe 30 PID 972 wrote to memory of 2904 972 Facturas Pagadas.exe 30 PID 972 wrote to memory of 2904 972 Facturas Pagadas.exe 30 PID 2904 wrote to memory of 2744 2904 Facturas Pagadas.exe 31 PID 2904 wrote to memory of 2744 2904 Facturas Pagadas.exe 31 PID 2904 wrote to memory of 2744 2904 Facturas Pagadas.exe 31 PID 2904 wrote to memory of 2744 2904 Facturas Pagadas.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 363⤵
- Program crash
PID:2744
-
-