Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe
Resource
win7-20240903-en
General
-
Target
74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe
-
Size
775KB
-
MD5
3d2aa96e0c0fc96e532f8de3aab5b129
-
SHA1
c796b358eef688f21e84a8664356fc6120158d78
-
SHA256
74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75
-
SHA512
de2b4f5e16773db49261b05d9f369b054a5ed6e654b2be5aa35c279b10d34ef9d0ab5e0fa0207ee11e8597f61f14b1355f7f3ec2f246b86119a6658fc87785da
-
SSDEEP
12288:/D1XDTyUGFpTwCDfwR7N1ljwV17dZixJBFqDk1ILuFatDGpYlmVqX9lxAzx:5vtaTweoR7N3M77M5GLH3l9lxE
Malware Config
Extracted
formbook
4.1
ja25
walkinet.com
shuifengshi.com
slowbarcelona.com
memc-gvo.com
bloquo.com
aurelashesbeauty.com
makepassiveway.com
kguvpkh.icu
benny.industries
t04mo9.com
getafurnace.com
earthadventurers.today
partsgt.com
kg0sxa1.icu
p7lzww8m.space
sarkariyojanayain.com
asp7ex4.icu
kg6u7ik.icu
h2butterfly.com
herdesirablepleasures.com
plexio.net
asalleg.icu
sunval.site
589815.com
theswissformula.com
laixetienthanh.net
okpayqb2.com
vaynganhangvpbank.com
goodluckfinancepvtltd.com
flauntstrategy.com
sexdem.net
thelittlebeercompany.com
as257gg.icu
thelittlebeercompany.com
viagemperu.com
thisisponyclub.com
cabeutolos.com
themesskits.com
ovinode.com
kglanv5.icu
bg-hyuplus.com
lotusonlineid.com
sdift.com
bgfygeu.site
rushanhkhy.com
realityjunkie.net
fastkillgaming.space
ybon.net
zyuje.top
lagital.com
subfbgiare.site
betesdunord.com
ikbaldagitim.site
asi8iwn.icu
gutro.online
kanojo.club
nhahanghaisanquycan.xyz
brandslee.com
asw87uu.icu
asr3gib.icu
askpai1.icu
matthewbrower.net
paanchlinkbanade.life
gorbacewicz.com
asu175t.icu
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4636-2826-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4636-2830-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4636-2834-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4504 set thread context of 4636 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 83 PID 4636 set thread context of 3528 4636 InstallUtil.exe 56 PID 4636 set thread context of 3528 4636 InstallUtil.exe 56 PID 432 set thread context of 3528 432 raserver.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 4636 InstallUtil.exe 4636 InstallUtil.exe 4636 InstallUtil.exe 4636 InstallUtil.exe 4636 InstallUtil.exe 4636 InstallUtil.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe 432 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4636 InstallUtil.exe 4636 InstallUtil.exe 4636 InstallUtil.exe 4636 InstallUtil.exe 432 raserver.exe 432 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe Token: SeDebugPrivilege 4636 InstallUtil.exe Token: SeDebugPrivilege 432 raserver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4636 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 83 PID 4504 wrote to memory of 4636 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 83 PID 4504 wrote to memory of 4636 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 83 PID 4504 wrote to memory of 4636 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 83 PID 4504 wrote to memory of 4636 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 83 PID 4504 wrote to memory of 4636 4504 74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe 83 PID 3528 wrote to memory of 432 3528 Explorer.EXE 93 PID 3528 wrote to memory of 432 3528 Explorer.EXE 93 PID 3528 wrote to memory of 432 3528 Explorer.EXE 93 PID 432 wrote to memory of 3936 432 raserver.exe 98 PID 432 wrote to memory of 3936 432 raserver.exe 98 PID 432 wrote to memory of 3936 432 raserver.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe"C:\Users\Admin\AppData\Local\Temp\74a098344fb282c483eaae1b536e90a6cbd78cbb8a7c4857bac3d65e05e70c75.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-