Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
IMG_20220926_0001.exe
Resource
win7-20241010-en
General
-
Target
IMG_20220926_0001.exe
-
Size
1016KB
-
MD5
c29ade6cb629271fa32e3ecc97757826
-
SHA1
7113cc1f08981d89e4038d7159744e39dec08168
-
SHA256
7a2a46ce8e2392d8f1afc79912f86e540c30f1a8428ec455f14182c0131403ed
-
SHA512
ade3953e9ceb93875b91ffb77131a2b76a1bf763d34f0c690f44f178c35522bc5cf023671b98c73dca51ebb4ed3844f325cbacaf3ae6882541fbb3b902b7977e
-
SSDEEP
12288:edBMsHT+oXKSslNvgT5PqdOHQYleaIqHLJnt16K4HTN:yBRz+hOsOweIqrJt1
Malware Config
Extracted
formbook
4.1
te04
oaif.rest
snapchat25.site
ampenova.online
xn--kj0b57geuvy9e.shop
bravobistro.xyz
meebits-freemint.xyz
namaz.city
tdmanagement.info
ytumz.xyz
industrialized.shop
laviedouceexperience.com
aubolabel.com
semblally.shop
vistlink.makeup
adidaihoka.com
gabrielmanfredi.online
sheka.xyz
bcvn2.club
digitalwebtricks.com
poocoin-app-charts.online
landsharesfg.net
qxlbjp.store
dumptrailers4rent.com
today-trends-reviews.info
jfdhobbies.online
socialgamers.online
qahomecom.com
newbutterflyfoundation.com
winegunmen.com
transmecsped.com
xmsolutions.net
dkbbankingonline.click
ftuesgxb.work
runut.top
private-jet.click
courtesanscanada.com
xpressewa.store
atlantahomicide.net
34986.top
hkexchange.one
camper-deal.store
armadameganrental.com
kippcollegiateathleticzone.com
zijadsare.space
skia-fafb.life
fiumaralupin.space
gabrieliglesias2024.com
zhaopp1.buzz
meetapub.com
ju-8523.com
teamin.tech
douban.work
arubapiana.cloud
86602.top
musicbooksus.com
veganingrids.store
odukart.com
temporary123.website
altnmaia.com
friendshipengineers.com
euyasminmiranda.com
baijuyun.xyz
billiedruryrealtor.com
marachui-resort.com
joannedifrisco.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1028-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1028-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2916-24-0x0000000001200000-0x000000000122F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3396 set thread context of 1028 3396 IMG_20220926_0001.exe 98 PID 1028 set thread context of 3592 1028 IMG_20220926_0001.exe 56 PID 2916 set thread context of 3592 2916 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_20220926_0001.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1028 IMG_20220926_0001.exe 1028 IMG_20220926_0001.exe 1028 IMG_20220926_0001.exe 1028 IMG_20220926_0001.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe 2916 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1028 IMG_20220926_0001.exe 1028 IMG_20220926_0001.exe 1028 IMG_20220926_0001.exe 2916 msdt.exe 2916 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1028 IMG_20220926_0001.exe Token: SeDebugPrivilege 2916 msdt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3396 wrote to memory of 1028 3396 IMG_20220926_0001.exe 98 PID 3396 wrote to memory of 1028 3396 IMG_20220926_0001.exe 98 PID 3396 wrote to memory of 1028 3396 IMG_20220926_0001.exe 98 PID 3396 wrote to memory of 1028 3396 IMG_20220926_0001.exe 98 PID 3396 wrote to memory of 1028 3396 IMG_20220926_0001.exe 98 PID 3396 wrote to memory of 1028 3396 IMG_20220926_0001.exe 98 PID 3592 wrote to memory of 2916 3592 Explorer.EXE 99 PID 3592 wrote to memory of 2916 3592 Explorer.EXE 99 PID 3592 wrote to memory of 2916 3592 Explorer.EXE 99 PID 2916 wrote to memory of 4904 2916 msdt.exe 101 PID 2916 wrote to memory of 4904 2916 msdt.exe 101 PID 2916 wrote to memory of 4904 2916 msdt.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-