Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe
Resource
win7-20241010-en
General
-
Target
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe
-
Size
884KB
-
MD5
1b415a56616a9f7c2e37fc2ce570664f
-
SHA1
2e7a5b8378e9a0e5fd7f5a8321af4d128ef2a1a3
-
SHA256
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd
-
SHA512
e77e25ffeae630cc2413fd969462a7fd019738f2981b4304ab6ba4cc5bb9530db3f1210c5cb90665529f6c25c03f6a63362362a18e6bb801edeccc979a0f711b
-
SSDEEP
12288:c6NsBxnXmu2YWb3Hc3qGuyTM/cTO5t0M5XYMQ2Ds0yW7AWgLmKijL8DP:c6NE2u2YWaDucTO5mM5XHhzy4AsXcP
Malware Config
Extracted
formbook
4.1
vn3b
rowenglobal.com
abrirumaempresa.com
videosbet.xyz
blackbettyxt.com
trust-red.net
sonyalpharunors.com
shiqichaoji.com
allex-ru.com
totalpowerpc.store
ptocom.com
quantumsai.club
toughcookie.love
nivafitness.com
bioskopmovie21.com
giatsaygiare.com
xiongmaojingxuan.com
zjjly88.com
trampmotorsports.com
pibblekibble.com
mymounntnittanyhealth.com
thesysonline.com
thegioimyphamduc-nhat.info
uninegi.com
keystaenterprises.com
jlkfp.com
namikuid.com
tomverkuijlen.com
tamcotiresshop.com
wanb88.com
livedirecthdtv24.xyz
orangestoreusa.com
nextgenerationsolutions.info
krazytiedyes.com
localdailyobserver.com
meg-as.com
ksubaka-intl.com
secretlove4you.com
sesionmx1.online
losninosygi.com
kootenaydiscsupply.com
cmacconstructionbuild.com
dxgav58.com
verdenit.com
findinghonesty.com
noodoeos.com
generiscollection.com
getridofmole.com
navniddhiprinting.com
2gether.company
kmm-design.com
valengz.com
extremefabportal.com
homeapplianceexpert.com
goldcoin.bet
tranz4mations.com
reliefgift.com
rspermatabekasi.com
chelseaavan.com
devicharanadda.com
celebritymesh.com
nurse2nurse.info
theexpertinsuranceagency.com
wygouji.com
marvinlucassuperpac.com
lifeafterbobby.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5000-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 5000 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 5000 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 5000 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1628 wrote to memory of 5020 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 102 PID 1628 wrote to memory of 5020 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 102 PID 1628 wrote to memory of 5020 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 102 PID 1628 wrote to memory of 5000 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 103 PID 1628 wrote to memory of 5000 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 103 PID 1628 wrote to memory of 5000 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 103 PID 1628 wrote to memory of 5000 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 103 PID 1628 wrote to memory of 5000 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 103 PID 1628 wrote to memory of 5000 1628 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"2⤵PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-