Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe
Resource
win7-20240903-en
General
-
Target
6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe
-
Size
774KB
-
MD5
6721b437108e8794658374c8e7f34367
-
SHA1
759e55fa486249ade94d245c5b833c425c4ed1bb
-
SHA256
6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c
-
SHA512
e34f07f125e88f034359e8d807a1330725da08dfc6023df204ee24dad48202dcc0b16aeb5d058b1e1b74fa37de59ac88705de0c96c92e93e814f5dce31f64239
-
SSDEEP
12288:qjmk9e7a1dI7YC+WkYT1Fm1x/Uik6EMXpHC7OvC7MwroP4etoK6zDLf68Q:nREQkGKHXpi7OvCQwroPSK6Pu8Q
Malware Config
Extracted
formbook
4.1
s0s2
stripe-forecast.com
perfectingnextstage.com
primarole.com
nonnydesigns.com
wordsofweightandlevity.com
mafleursam.com
hardwarepicker.tech
minex-intl.com
thenextbigtech.net
rabeproject.com
sticktogracestudio.com
releve.space
readoku.net
carings.net
nasdaq-ex.store
au-techng.com
thethoughtgenius.com
how-to-learn-languages.net
kitabisabelanja.com
awndka.xyz
bretholdings.com
boscue.com
titantechmail.com
jadacomercializadora.com
shirtgse.online
derechoromano.com
yatirimtamam.com
gektolicompany.xyz
skyglowtech.com
67f5ead1a275.info
emnopgroup.com
lermontov.online
roshmary.com
goodandperfectgift.com
landliner.taxi
bhui7.com
barq-id.com
thevirtualcafe.net
176bwcx.com
zorbaplus.com
zzbb8899.xyz
magictvshow.com
serengetifadhions.com
ryzcn.com
amsordglobal.com
biznes-poznan24.xyz
globalepic10x.com
carrotshelter.com
keiwaseitai.online
energyecuador.net
kinsgtonbrass.com
cankaoao.com
mybullion.net
zjzcmy.net
businedstrack.com
mayipaimai.com
minijob-duesseldorf.net
gcpropolis.com
liwoo.top
glitzye.com
doca29.site
joselynbaezs.com
purchase614210.com
wojiayouxuan.com
dailycuatudong.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4080-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2284 set thread context of 4080 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 4080 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 4080 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4080 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 99 PID 2284 wrote to memory of 4080 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 99 PID 2284 wrote to memory of 4080 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 99 PID 2284 wrote to memory of 4080 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 99 PID 2284 wrote to memory of 4080 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 99 PID 2284 wrote to memory of 4080 2284 6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe"C:\Users\Admin\AppData\Local\Temp\6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe"C:\Users\Admin\AppData\Local\Temp\6fe1fe1a97833a5377fcaf8ac6c0baebaf6d5509f5f7122efc2325546488d05c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-