Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe
Resource
win7-20240903-en
General
-
Target
d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe
-
Size
1.0MB
-
MD5
a5bfded33b102cad8a69dbe56f3beb1f
-
SHA1
17ff6f9cd309ae33eb6e38cec0b86cdf37245e6a
-
SHA256
d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8
-
SHA512
47734a212c4c1aee436b0300e351560b6f01ba2426d06800056e16dcec81d2a46be38e2299c3d778cc7bc3399051645ccbbea42599efffea7376f7ae055a8b65
-
SSDEEP
24576:1ctcno/vKeX2U5x2wweb8MONmRHNHF8d4joTT+M694rjtpv6D:iS8HXZx2wwetNgNT+M6o3vW
Malware Config
Extracted
formbook
4.1
sn31
matsuomatsuo.com
104wn.com
bolacorner.com
dawonderer.com
yourpamlano.xyz
mtzmx.icu
lepakzaparket.com
barmagli.com
danta.ltd
marumaru240.com
people-centeredhr.com
test-brew-inc.com
clairvoyantbusinesscoach.com
aforeignexchangeblog.com
erentekbilisim.com
gangqinqu123.net
defiguaranteebonds.com
thegioigaubong97.site
vaoiwin.info
vcwholeness.com
03c3twpfee5estjovfu2655.com
mutantapeyachtclubtoken.store
pixelkev.xyz
corporacioncymaz.com
iampro-found.com
azureconsults.com
bam-bong.com
advanceresubeopene.biz
tzjisheng.com
krdz28.online
ycw2009.com
minioe.com
dronelink.xyz
autu.cfd
sdwmkj.com
uixray.xyz
informacion-numero-24-h.site
123dianyingyuan.com
tj-assets.com
usaservicedogregistratuon.com
metagwnics.com
pepeksquad2.host
kc7.club
yundtremark.com
finance-employers.com
euroglobalnews.info
estudioenzetti.com
rodosmail.xyz
bm65.xyz
bchmtn.net
server4uuss.net
maisonretraiteprivee.com
atelierelzaaidar.com
thegurlyboutique.com
primobellaquartz.com
jetskirentaldublin.com
akmeetech.com
withoutyoutube.com
blackcreekwatershed.com
89qp52.com
e3488.com
vote4menk.com
tyma.club
theceditpalooza.com
boxberry-my.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3216-2033-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3216-2037-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3216-2041-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2528 set thread context of 3216 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 82 PID 3216 set thread context of 3456 3216 InstallUtil.exe 56 PID 3216 set thread context of 3456 3216 InstallUtil.exe 56 PID 4620 set thread context of 3456 4620 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 3216 InstallUtil.exe 3216 InstallUtil.exe 3216 InstallUtil.exe 3216 InstallUtil.exe 3216 InstallUtil.exe 3216 InstallUtil.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe 4620 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3216 InstallUtil.exe 3216 InstallUtil.exe 3216 InstallUtil.exe 3216 InstallUtil.exe 4620 netsh.exe 4620 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe Token: SeDebugPrivilege 3216 InstallUtil.exe Token: SeDebugPrivilege 4620 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3216 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 82 PID 2528 wrote to memory of 3216 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 82 PID 2528 wrote to memory of 3216 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 82 PID 2528 wrote to memory of 3216 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 82 PID 2528 wrote to memory of 3216 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 82 PID 2528 wrote to memory of 3216 2528 d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe 82 PID 3456 wrote to memory of 4620 3456 Explorer.EXE 88 PID 3456 wrote to memory of 4620 3456 Explorer.EXE 88 PID 3456 wrote to memory of 4620 3456 Explorer.EXE 88 PID 4620 wrote to memory of 3048 4620 netsh.exe 91 PID 4620 wrote to memory of 3048 4620 netsh.exe 91 PID 4620 wrote to memory of 3048 4620 netsh.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe"C:\Users\Admin\AppData\Local\Temp\d29cda1e066eb7acae10ddc9c916d3b019aa55710197c58cf967d89db4d275b8.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-