Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
21 de agosto Nueva solicitud de cotización.exe
Resource
win7-20240903-en
General
-
Target
21 de agosto Nueva solicitud de cotización.exe
-
Size
910KB
-
MD5
14089f35edb31d10e2e9619ee5008159
-
SHA1
f75f2aec3c32d5fa43ce9861d273ea9762fa8386
-
SHA256
d9993a3a31c12b8f8c15f571680a14fb426e28ecd130430a93e3b3cd34563ac0
-
SHA512
7e4a759ca47f8dadb42f39e51d5096a958fbe659ed67c344109c086f36942fb1c5609547e721798ee8505ca13182145d87ed65af5b1069c6c44ec35cc0dd7e2b
-
SSDEEP
12288:CG8Dc9F3nC0Py3gAhvKWi/ZDPOB/fXgGgm+hWVqpCyyPqqFizttIOIFye2YX6TZd:CGqi/ZYpq/CnFQt5Re2A6TcYCS4sfD
Malware Config
Extracted
formbook
4.1
gz92
ayurvedichealthformulas.com
plazaconstrutora.com
nat-hetong.info
eapdigital.com
ibluebaytvwdshop.com
committable.com
escapesbyek.com
mywebdesigner.pro
jianianhong.com
benvenutoqui.com
beiyet.com
theartofgifs.com
mbwvyksnk.icu
nshahwelfare.com
hhhservice.com
thechaibali.com
travelscreen.expert
best123-movies.com
leiahin.com
runplay11.com
oorulyh.icu
mypatchworkfamily.com
twerkwhileyouworkplanners.com
bradentonroofwashing.com
donandy.com
lonewolfchad.com
celsisenergy.net
humanweed.com
rosybakery.com
cookinwithsugarlious.com
1s5dnwzwv8tht8vi0v78kde4e.com
heyshopy.com
chibiaegyoshop.com
neverbrokerage.com
theadventurebench.com
psicologiapaula.com
xinke518.com
re-change.net
prodj-gear.com
iamworldwideshop.com
onlinemusiclessons.info
yxsc576.com
staniselevators.com
goldenleashcanine.com
luxormedikal.com
protectcentralcoast.com
jaysfinefood.com
zeneanyasbyerika.com
t-algorithm.net
busty-italian.com
bestlawnkzoo.com
bakeology.store
assured-justice-nl.com
sexf5.com
liveyourmaverick.com
mkt10697.com
suxfi.com
cardiociencia.net
truetoselfclothing.com
mcgrudersfitness.com
savorfullpoints.com
naturesblendsupplements.com
eseskalierteh.com
netechsupport.com
peggeorge.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4776-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4776-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 728 set thread context of 4776 728 21 de agosto Nueva solicitud de cotización.exe 91 PID 4776 set thread context of 3444 4776 21 de agosto Nueva solicitud de cotización.exe 56 PID 5108 set thread context of 3444 5108 WWAHost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21 de agosto Nueva solicitud de cotización.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4776 21 de agosto Nueva solicitud de cotización.exe 4776 21 de agosto Nueva solicitud de cotización.exe 4776 21 de agosto Nueva solicitud de cotización.exe 4776 21 de agosto Nueva solicitud de cotización.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe 5108 WWAHost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4776 21 de agosto Nueva solicitud de cotización.exe 4776 21 de agosto Nueva solicitud de cotización.exe 4776 21 de agosto Nueva solicitud de cotización.exe 5108 WWAHost.exe 5108 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4776 21 de agosto Nueva solicitud de cotización.exe Token: SeDebugPrivilege 5108 WWAHost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 728 wrote to memory of 4776 728 21 de agosto Nueva solicitud de cotización.exe 91 PID 728 wrote to memory of 4776 728 21 de agosto Nueva solicitud de cotización.exe 91 PID 728 wrote to memory of 4776 728 21 de agosto Nueva solicitud de cotización.exe 91 PID 728 wrote to memory of 4776 728 21 de agosto Nueva solicitud de cotización.exe 91 PID 728 wrote to memory of 4776 728 21 de agosto Nueva solicitud de cotización.exe 91 PID 728 wrote to memory of 4776 728 21 de agosto Nueva solicitud de cotización.exe 91 PID 3444 wrote to memory of 5108 3444 Explorer.EXE 93 PID 3444 wrote to memory of 5108 3444 Explorer.EXE 93 PID 3444 wrote to memory of 5108 3444 Explorer.EXE 93 PID 5108 wrote to memory of 4896 5108 WWAHost.exe 94 PID 5108 wrote to memory of 4896 5108 WWAHost.exe 94 PID 5108 wrote to memory of 4896 5108 WWAHost.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\21 de agosto Nueva solicitud de cotización.exe"C:\Users\Admin\AppData\Local\Temp\21 de agosto Nueva solicitud de cotización.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Local\Temp\21 de agosto Nueva solicitud de cotización.exe"C:\Users\Admin\AppData\Local\Temp\21 de agosto Nueva solicitud de cotización.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1276
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\21 de agosto Nueva solicitud de cotización.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4896
-
-