Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe
Resource
win7-20240903-en
General
-
Target
d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe
-
Size
1.0MB
-
MD5
a5bfded33b102cad8a69dbe56f3beb1f
-
SHA1
17ff6f9cd309ae33eb6e38cec0b86cdf37245e6a
-
SHA256
d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8
-
SHA512
47734a212c4c1aee436b0300e351560b6f01ba2426d06800056e16dcec81d2a46be38e2299c3d778cc7bc3399051645ccbbea42599efffea7376f7ae055a8b65
-
SSDEEP
24576:1ctcno/vKeX2U5x2wweb8MONmRHNHF8d4joTT+M694rjtpv6D:iS8HXZx2wwetNgNT+M6o3vW
Malware Config
Extracted
formbook
4.1
sn31
matsuomatsuo.com
104wn.com
bolacorner.com
dawonderer.com
yourpamlano.xyz
mtzmx.icu
lepakzaparket.com
barmagli.com
danta.ltd
marumaru240.com
people-centeredhr.com
test-brew-inc.com
clairvoyantbusinesscoach.com
aforeignexchangeblog.com
erentekbilisim.com
gangqinqu123.net
defiguaranteebonds.com
thegioigaubong97.site
vaoiwin.info
vcwholeness.com
03c3twpfee5estjovfu2655.com
mutantapeyachtclubtoken.store
pixelkev.xyz
corporacioncymaz.com
iampro-found.com
azureconsults.com
bam-bong.com
advanceresubeopene.biz
tzjisheng.com
krdz28.online
ycw2009.com
minioe.com
dronelink.xyz
autu.cfd
sdwmkj.com
uixray.xyz
informacion-numero-24-h.site
123dianyingyuan.com
tj-assets.com
usaservicedogregistratuon.com
metagwnics.com
pepeksquad2.host
kc7.club
yundtremark.com
finance-employers.com
euroglobalnews.info
estudioenzetti.com
rodosmail.xyz
bm65.xyz
bchmtn.net
server4uuss.net
maisonretraiteprivee.com
atelierelzaaidar.com
thegurlyboutique.com
primobellaquartz.com
jetskirentaldublin.com
akmeetech.com
withoutyoutube.com
blackcreekwatershed.com
89qp52.com
e3488.com
vote4menk.com
tyma.club
theceditpalooza.com
boxberry-my.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/4788-2035-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/4788-2038-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3056 set thread context of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 4788 set thread context of 1120 4788 InstallUtil.exe 20 -
Program crash 1 IoCs
pid pid_target Process procid_target 4896 4852 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 4788 InstallUtil.exe 4788 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4788 InstallUtil.exe 4788 InstallUtil.exe 4788 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe Token: SeDebugPrivilege 4788 InstallUtil.exe Token: SeShutdownPrivilege 1120 Explorer.EXE Token: SeShutdownPrivilege 1120 Explorer.EXE Token: SeShutdownPrivilege 1120 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 3056 wrote to memory of 4788 3056 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 31 PID 1120 wrote to memory of 4852 1120 Explorer.EXE 32 PID 1120 wrote to memory of 4852 1120 Explorer.EXE 32 PID 1120 wrote to memory of 4852 1120 Explorer.EXE 32 PID 1120 wrote to memory of 4852 1120 Explorer.EXE 32 PID 1120 wrote to memory of 4852 1120 Explorer.EXE 32 PID 1120 wrote to memory of 4852 1120 Explorer.EXE 32 PID 1120 wrote to memory of 4852 1120 Explorer.EXE 32 PID 4852 wrote to memory of 4896 4852 msiexec.exe 33 PID 4852 wrote to memory of 4896 4852 msiexec.exe 33 PID 4852 wrote to memory of 4896 4852 msiexec.exe 33 PID 4852 wrote to memory of 4896 4852 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe"C:\Users\Admin\AppData\Local\Temp\d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 2683⤵
- Program crash
PID:4896
-
-