Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
Facturas Pagadas.exe
Resource
win7-20241010-en
General
-
Target
Facturas Pagadas.exe
-
Size
536KB
-
MD5
ad3b7a36fc62bf369b5c563d2b5db945
-
SHA1
3e43c14f9e010f1bcdcce6618f9ca5503de08579
-
SHA256
af0af3ebf3ac231ad77dbe4cbfa0fb2d48312d4ca0b5431081046ab09aa3b552
-
SHA512
2de28e6d8dff912a57e958ddeea51876cbd10e448221807837b6ba6a592acc70434d3be7f1695e3651ea6c2483d0cb3220be96f5e93b1be3f5234b1e5060e811
-
SSDEEP
12288:9IdemtiK5oBfZQElcqE+RqFoVnQ1PSYNsEOmuBE6rp:V+FoBfDcqE+4FInqPSzmf6rp
Malware Config
Extracted
formbook
4.1
g4m1
detect-guide.fyi
ethmetaverse.info
21centmasks.com
statemint.network
decowonderland.com
phairrealty.com
drhillda.com
wir-koennen-gesund.info
m-cloudplatform.com
baduapp.site
trydextrus.com
unlimiteddecorations.com
zagfundraisong.com
gaincapita.com
przemekkulik.online
joshwiliam.online
k8worldcup94.com
soobanhaider.com
dein-hochzeitsladen.com
chirpvision.com
63056.xyz
uhuhuhu.xyz
haltingqwegrj.xyz
wrappedsportscards.com
dresslikeasalesboss.com
lonestarstaggrips.com
andrymoraleswebsite.com
hbxgjg.com
cufon.xyz
zhangyunan.xyz
brisbanecpa.com
staphynbcb.store
lora2matter.site
guwanmaimai.com
zr355.com
lifecoaching.tours
progressiq.net
electricwatertoys.com
chinacityfund.com
shopcelularmx.com
asteya-shop.com
holidayresort.online
millibruce.com
atlasecomarket.com
whataremydivorcerights.com
e-servismerkez.com
sechsy.com
1stpersonteam.com
apexbusinesssystems.com
szlvling.com
bankonthemoon.com
blxsch.com
infinityexpander.com
ytdqbj.com
mercadopapaya.com
nftw.fund
remedialpax.com
ds8r8ugy.xyz
enlightenedmonkeystudios.com
1dingljd.xyz
lakeview5321.com
katezarb.com
jamesanthonymurphy.com
luyenn.store
kaixin332.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1072-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1072-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1072-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3736 set thread context of 1072 3736 Facturas Pagadas.exe 98 PID 1072 set thread context of 3524 1072 Facturas Pagadas.exe 56 PID 1072 set thread context of 3524 1072 Facturas Pagadas.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Facturas Pagadas.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1072 Facturas Pagadas.exe 1072 Facturas Pagadas.exe 1072 Facturas Pagadas.exe 1072 Facturas Pagadas.exe 1072 Facturas Pagadas.exe 1072 Facturas Pagadas.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1072 Facturas Pagadas.exe 1072 Facturas Pagadas.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1072 Facturas Pagadas.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3736 wrote to memory of 1072 3736 Facturas Pagadas.exe 98 PID 3736 wrote to memory of 1072 3736 Facturas Pagadas.exe 98 PID 3736 wrote to memory of 1072 3736 Facturas Pagadas.exe 98 PID 3736 wrote to memory of 1072 3736 Facturas Pagadas.exe 98 PID 3736 wrote to memory of 1072 3736 Facturas Pagadas.exe 98 PID 3736 wrote to memory of 1072 3736 Facturas Pagadas.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-