Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe
Resource
win7-20241010-en
General
-
Target
280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe
-
Size
1.1MB
-
MD5
d59b57c9148dca2f692fd46b87d5cfa4
-
SHA1
02aecf7a03667332c65c998030754f66ca95ae5c
-
SHA256
280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881
-
SHA512
5ae30d9855d7792cb3a6baa55ec33c9aaf0e33c9cb516b6f509d8febaaf73b6ffc498b84f00f49f88febdd064d87886ccaa08fe85e5c6d22f37248f94686f48a
-
SSDEEP
24576:thLuyybqu13JvG47hloOmxpKTFfP/9hnZs:bLuyybb13Ju47hEpKZnv
Malware Config
Extracted
formbook
fwmz
EVMoY7Gw+zpNcMLX
eXADD4RePMOo+0RvOxjO/Q==
HUAzaMufWaVUl6RcbC0gPiu7EQ==
2M3iedmKTSWi8D5pOxjO/Q==
heFzVamRKfl1dwTLbA==
fxyeUGblrhj0MlLfOxjO/Q==
6jEARb17RJQKRJHIYB3LD/+9
3htk8zHUxezkKDA=
Sj1Hu/6kYE4HhsMxSAA=
Zq8IzvjIWeB4+w==
eYiQ3SG7qOzkKDA=
PZMa7lsB2+zkKDA=
aXEH9k8N1q1jdwTLbA==
7BdtDGwYBNOP0i4Bkj7+CPXsCUv6
DPnyLItdG2EPaIItUfICLLc4zvkWHA==
FyEvlOiOVMK3GHUpuVYJaUYbG3M=
MjnCgM52NPlJkaBLbxzLD/+9
1cXQN5JaL3gcY6Z5j1AYg0YbG3M=
39ReTLB4YOVaoSfqmhc=
oP/Fwf+hYLx8ftOlwlU6Iy6zAIHTFA==
pzHvNbRmPxnaJDLlbCfLD/+9
2970dbZaEuhoobZev7WY5A==
ETQHEXoZ+AT0UJ1yQgTw
qv2XrAKijXdEv/13l080+qk=
uvPEDn0pHBRNcMLX
n6kwEnEf5LFEm5AyPtqsHA0hNE38
ndugxSnzzIdAjc+TOvLbaUYbG3M=
Bv2MggO0oKMUW6zL53UcgkYbG3M=
AfkCdstoJoFwjyDddQ==
x+Miieblbcg=
KmwnH3kUpcd+7A==
I3Q3K2b83GYSbsMxSAA=
XqVtcrNTJuZ0dwTLbA==
ZcTHA1Mk4ioagcMxSAA=
Xa8+JVUD4G4vdsMxSAA=
OY+W4CflkPoYIXpJahzLD/+9
4e9yObJcRk6f8Ai5zsF6G6E=
3D/b71kf1OzkKDA=
xgnUCVkLAnkVXZZyQgTw
3ENd0h3PxuzkKDA=
apFYVrNdS0X19zjIYDD4
YnsE4UwK+/Gg3+5yQgTw
Hm2HCnIu+0T6au29Tw3y
7UFc82Bh6tKH7g==
5P1XGo8+Cf7ALnaq1MF6G6E=
FUKHJ4M9HiwcIDjpSEU4XM1H+vzkBQ==
THVEng3Xtb9BmJY8FhXSPcPV1O6w7Fo=
79XlgeB5XMJ0ubpLaxzLD/+9
hrmJqfqGO5scc3Eht1gMDfPxEoBLtgQrvw==
Smm5Wbx5QgqM5DIRcglrFqA=
zhjrIm8kH4f4PpJQZ/aeVUYbG3M=
KXUwGXUVpcd+7A==
Fytt5DvzxiP3NX6jzsF6G6E=
6kODLos15406cXovTwg=
CSHwA20dGgN4dwTLbA==
795SHWkM/O6B/gqqwMF6G6E=
8hDNqRrOxOzkKDA=
9S9xD2QAs4UznN8PE66X/8T/0u6w7Fo=
jePfF3MVBwPLHC7QOxjO/Q==
5j2IGIch/nY6ZxeQOxjO/Q==
DgELjQG6ti3jTJRUciPLD/+9
qamyDEfss6AQW5642m8cgkYbG3M=
8QlV+SOzglXID2IfsGxPPiu7EQ==
dnsVEk3qxaufCh3feVjMn5QZiwTy
huntingarchive.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2192 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31 PID 2568 wrote to memory of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31 PID 2568 wrote to memory of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31 PID 2568 wrote to memory of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31 PID 2568 wrote to memory of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31 PID 2568 wrote to memory of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31 PID 2568 wrote to memory of 2192 2568 280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe"C:\Users\Admin\AppData\Local\Temp\280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe"C:\Users\Admin\AppData\Local\Temp\280dfcc65a689143d9976fa88636c45c1dee63190a20ef72612d384635a22881.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-