Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe
Resource
win7-20240903-en
General
-
Target
74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe
-
Size
775KB
-
MD5
3d2aa96e0c0fc96e532f8de3aab5b129
-
SHA1
c796b358eef688f21e84a8664356fc6120158d78
-
SHA256
74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75
-
SHA512
de2b4f5e16773db49261b05d9f369b054a5ed6e654b2be5aa35c279b10d34ef9d0ab5e0fa0207ee11e8597f61f14b1355f7f3ec2f246b86119a6658fc87785da
-
SSDEEP
12288:/D1XDTyUGFpTwCDfwR7N1ljwV17dZixJBFqDk1ILuFatDGpYlmVqX9lxAzx:5vtaTweoR7N3M77M5GLH3l9lxE
Malware Config
Extracted
formbook
4.1
ja25
walkinet.com
shuifengshi.com
slowbarcelona.com
memc-gvo.com
bloquo.com
aurelashesbeauty.com
makepassiveway.com
kguvpkh.icu
benny.industries
t04mo9.com
getafurnace.com
earthadventurers.today
partsgt.com
kg0sxa1.icu
p7lzww8m.space
sarkariyojanayain.com
asp7ex4.icu
kg6u7ik.icu
h2butterfly.com
herdesirablepleasures.com
plexio.net
asalleg.icu
sunval.site
589815.com
theswissformula.com
laixetienthanh.net
okpayqb2.com
vaynganhangvpbank.com
goodluckfinancepvtltd.com
flauntstrategy.com
sexdem.net
thelittlebeercompany.com
as257gg.icu
thelittlebeercompany.com
viagemperu.com
thisisponyclub.com
cabeutolos.com
themesskits.com
ovinode.com
kglanv5.icu
bg-hyuplus.com
lotusonlineid.com
sdift.com
bgfygeu.site
rushanhkhy.com
realityjunkie.net
fastkillgaming.space
ybon.net
zyuje.top
lagital.com
subfbgiare.site
betesdunord.com
ikbaldagitim.site
asi8iwn.icu
gutro.online
kanojo.club
nhahanghaisanquycan.xyz
brandslee.com
asw87uu.icu
asr3gib.icu
askpai1.icu
matthewbrower.net
paanchlinkbanade.life
gorbacewicz.com
asu175t.icu
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/7608-2826-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/7608-2830-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2440 set thread context of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 7608 set thread context of 1200 7608 InstallUtil.exe 21 PID 7692 set thread context of 1200 7692 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 7608 InstallUtil.exe 7608 InstallUtil.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe 7692 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 7608 InstallUtil.exe 7608 InstallUtil.exe 7608 InstallUtil.exe 7692 wscript.exe 7692 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe Token: SeDebugPrivilege 7608 InstallUtil.exe Token: SeDebugPrivilege 7692 wscript.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 2440 wrote to memory of 7608 2440 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 30 PID 1200 wrote to memory of 7692 1200 Explorer.EXE 31 PID 1200 wrote to memory of 7692 1200 Explorer.EXE 31 PID 1200 wrote to memory of 7692 1200 Explorer.EXE 31 PID 1200 wrote to memory of 7692 1200 Explorer.EXE 31 PID 7692 wrote to memory of 7752 7692 wscript.exe 32 PID 7692 wrote to memory of 7752 7692 wscript.exe 32 PID 7692 wrote to memory of 7752 7692 wscript.exe 32 PID 7692 wrote to memory of 7752 7692 wscript.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe"C:\Users\Admin\AppData\Local\Temp\74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:7608
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7692 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:7752
-
-