Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe
Resource
win7-20240708-en
General
-
Target
020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe
-
Size
724KB
-
MD5
ab5eed71310107061cac2b4f3234ead5
-
SHA1
83296a79376280e38d0677928eddca6d015a3e49
-
SHA256
020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793
-
SHA512
d549afa983e2640803814e34b13711f7a16a64d10a61620c2edc12c937bc13a0e9fe4f50135d9696984035547fbd9aaf5ff0e2020e8b135695e3b0c63f712d1e
-
SSDEEP
12288:EQNABBz7krBNkt6QS9UwPlOu8NDupn9kDJCbXXojdRGyvI1EgdkjezUh6ji8z:N0ktNbJlv/puJCb
Malware Config
Extracted
formbook
4.1
xpg
nebuless.net
handsomelildevil.com
cancinauto.com
cassiemariesolutions.com
barbarabubble.com
activ8.xyz
findousd.com
cacingcau.com
dengfeng.chat
nsctherapy.com
bluedemonstudio.net
cftx168.com
migosbiz.com
utcannabis.tech
progressivewellnessrx.com
euralix.com
texasbestchambers.com
sensotop.com
dondosha.club
nfxaccountmanager.com
tufreelancer.com
xuehuasa.ltd
znzcstyua.icu
lightworkdefense.com
servicedarling.com
typeaa.com
furmela.com
ptptk.com
healthyreforce.com
pampermelux.com
ocfoundation.info
tqktiffxctz.mobi
mymedichain.com
sforrestconsult.com
erlacollection.com
strat-options.com
vibr8addlife.com
danfrem.com
citestwebzsfdsdfr.com
misex.info
leandropedra.com
joe-giudice.com
mysticalthrills.com
desksbypapa.com
legacy4ever.com
simplybrandy.com
crumbremoval.info
7kesw69mfduxa9.net
executivesanitizingsolution.com
adriennetilley.com
superbartenderhire.com
pathsiteofficial.com
awesomefriendsadventures.com
petrichorliving.com
myralaurafarms.com
chethebrand.com
bc-cleaners.com
troels1.com
jack2design.com
littlebitch.net
adesignawardmuseum.net
dropboxhere.com
9400510.com
scoutcasting.com
liltel.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2980-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2980 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31 PID 2696 wrote to memory of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31 PID 2696 wrote to memory of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31 PID 2696 wrote to memory of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31 PID 2696 wrote to memory of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31 PID 2696 wrote to memory of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31 PID 2696 wrote to memory of 2980 2696 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe"C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-