Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe
Resource
win7-20240903-en
General
-
Target
a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe
-
Size
1.0MB
-
MD5
2cf26b9ca6de978134bf34e881525e73
-
SHA1
3f31fde180f01c1f2cf4976f38f6e142268feb92
-
SHA256
a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2
-
SHA512
99c306ce84c9bec9a27a275a514597a0e1773059357e41105c0f769365666c7298bcbb5038a45492975cfb3ee2965e057b30b63243af911f3ded03089cf6b84d
-
SSDEEP
24576:lqco14WIVkJPj6Yhk5Ue0uO0gAELPvLvpSf:lqrGt+JWYhk5Ue0uO0gvr
Malware Config
Extracted
formbook
scr3
IHJ9JVzAYK2EdGsB8Q==
tQQl6U7e5rfQ8KVIH41w+Ic=
FYieRjtFwhOhFFSvVIpQ4A==
jKzNCXBNZCpMdnVKatuN75g=
i3wz0asEojI0KuzYp62sFM46UQ==
+iRIHQcTwlOWHYJM/T+p
6JREbp/z4sLyDvm6o+Y=
ydTX2x/IbuLKFF2xYR21
ouHaYURXoZ4tl1L48w==
wR1dgL2/bcttD0jXvGz6LPAY7VzIJrY2Pw==
FGKSZFtrGYYVffi4Qi+596QMmWSffQ==
DBsYMHBNyDPhjzbtq1bmGcYJ1oSs
RJfO+Sz4BOOszYAh
zqxB4ctdj5LoqXhh+w==
WQSNj7gOui405jUyP6Fe0r2yhAg=
iLTDyCL/HR5tVfm6o+Y=
fiq4ygBd+0nXWpkGCwPKXEF+gQI=
2m+ubVwwh0HfKw==
KlJtjJj0jAkT0Dc0Cymh2L2yhAg=
SqLAZpjhRaSrYIJVKTCy4g==
RICINXbRccxTrBT/gzy9
51xwaaCFqZstl1L48w==
UIaLFfgWuA6C6Ca9mMuD8w==
qBY0/1m3ULFs+5oN+Q==
pIILoM+v3MbzUb6/ouQ=
eQCBORZk/Iu1e+7Nd3mH7pA=
MU1Xa56Evslilpc4MjIgZ1KVWg==
5wILNrOgmWR9l1L48w==
nJSSsx4rW0bE8vRA9joWpE/UXBdgJrY2Pw==
HJ7Er/almad7lD4=
zUBeBua5HXwuzBagWJZt6g==
/E5ylwLqEen/3Hg6EMu3L9gMXpPwyb4=
An3E/naeUitTMw==
JaosUMIdiRZz30I4Cymh2L2yhAg=
z1TV3z67oad7lD4=
pg4oup2tVOfvohXWcPK0nEzM
1TpA2Lqf/5wVPA==
/4jrSHjWf9p5LIJVKTCy4g==
7c8j9GQGkPCs6oY2
eRCqyjKeQK1dEWP/gzy9
GRklNY9vhF13MU/WrlYWZ1aIUA==
frDM9GVHQBtbI7XYyVHrJNgR15K1
FDdRcdbWO55cq7L2p9ysLcMJ1oSs
1fofRaiEck3RaqH9u3ApZ1KVWg==
mqBOF3dRXab1NSCcWJZt6g==
G64nSK0KqEGl9hNj+g==
sII4Bt86OBE+Co9T51M+xr2yhAg=
uzaw0ku2MIAWPEvq5N2EbBxXkg4=
gAB7kvZ5Hp24fuXg7G7oF8IJ1oSs
j+IGzNy71NJvCzKfWJZt6g==
ok3a/Wa2Uq4yl1L48w==
brzXgLY151dVS4M3
PV53luzJ/5wVPA==
94IIMrEblOOs6oY2
jBxQ9uH/pguN4G6cqhKhwXOW8qQXi9Kc
eQw20rbIYqsyl1L48w==
WCHZAWPAZNdRpBP/gzy9
91yFVmZ0F9NUjik=
LemVw/g/KeaRB3KvdASg
Nnp9D1Di8NlU8XIr
KW+RY1pn8HieyIJnwzm3
2cphK5ys08JMeKv+8A==
pAMLkb8RlAL3sBAKDIRVxr2yhAg=
Q/yJV7WLl6ZGkqHyl3YwZ1aIUA==
linknhacai11bet.xyz
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 636 set thread context of 4588 636 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4588 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 4588 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 636 wrote to memory of 4588 636 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 98 PID 636 wrote to memory of 4588 636 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 98 PID 636 wrote to memory of 4588 636 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 98 PID 636 wrote to memory of 4588 636 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 98 PID 636 wrote to memory of 4588 636 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 98 PID 636 wrote to memory of 4588 636 a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-