Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe
Resource
win7-20240708-en
General
-
Target
020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe
-
Size
724KB
-
MD5
ab5eed71310107061cac2b4f3234ead5
-
SHA1
83296a79376280e38d0677928eddca6d015a3e49
-
SHA256
020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793
-
SHA512
d549afa983e2640803814e34b13711f7a16a64d10a61620c2edc12c937bc13a0e9fe4f50135d9696984035547fbd9aaf5ff0e2020e8b135695e3b0c63f712d1e
-
SSDEEP
12288:EQNABBz7krBNkt6QS9UwPlOu8NDupn9kDJCbXXojdRGyvI1EgdkjezUh6ji8z:N0ktNbJlv/puJCb
Malware Config
Extracted
formbook
4.1
xpg
nebuless.net
handsomelildevil.com
cancinauto.com
cassiemariesolutions.com
barbarabubble.com
activ8.xyz
findousd.com
cacingcau.com
dengfeng.chat
nsctherapy.com
bluedemonstudio.net
cftx168.com
migosbiz.com
utcannabis.tech
progressivewellnessrx.com
euralix.com
texasbestchambers.com
sensotop.com
dondosha.club
nfxaccountmanager.com
tufreelancer.com
xuehuasa.ltd
znzcstyua.icu
lightworkdefense.com
servicedarling.com
typeaa.com
furmela.com
ptptk.com
healthyreforce.com
pampermelux.com
ocfoundation.info
tqktiffxctz.mobi
mymedichain.com
sforrestconsult.com
erlacollection.com
strat-options.com
vibr8addlife.com
danfrem.com
citestwebzsfdsdfr.com
misex.info
leandropedra.com
joe-giudice.com
mysticalthrills.com
desksbypapa.com
legacy4ever.com
simplybrandy.com
crumbremoval.info
7kesw69mfduxa9.net
executivesanitizingsolution.com
adriennetilley.com
superbartenderhire.com
pathsiteofficial.com
awesomefriendsadventures.com
petrichorliving.com
myralaurafarms.com
chethebrand.com
bc-cleaners.com
troels1.com
jack2design.com
littlebitch.net
adesignawardmuseum.net
dropboxhere.com
9400510.com
scoutcasting.com
liltel.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4080-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 4080 2972 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4080 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 4080 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2972 wrote to memory of 4080 2972 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 98 PID 2972 wrote to memory of 4080 2972 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 98 PID 2972 wrote to memory of 4080 2972 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 98 PID 2972 wrote to memory of 4080 2972 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 98 PID 2972 wrote to memory of 4080 2972 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 98 PID 2972 wrote to memory of 4080 2972 020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe"C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-