Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe
Resource
win7-20240708-en
General
-
Target
be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe
-
Size
775KB
-
MD5
94c1e957b1e28c57ef9ce07ccc914a32
-
SHA1
1aeec2fa9616e7751c83e788faa3e8af83ba059c
-
SHA256
be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78
-
SHA512
7cad46367a0e2fb7a3261804d283e6d33f2a45b60b10a4c16562bd1b1a29f894b2ef65fad3d355fedbd590042c5202713518cb46496655c305231083d8caa6a8
-
SSDEEP
12288:B2iN3M/CcdMo5E72KRgm9nnmzbjkcgIvr39oo3F5/W+:B1CaN72KRgmRmjkU3io3F93
Malware Config
Extracted
formbook
g44n
t60gB4YRvsDLttd9HG4=
xck8G7COQ+g7VIpX
BQQF3mmpLPskhQ==
eLWwmzNyK6ee+nF1jDvvkxuSGA==
3tlgNOzw8BBjpNOQMnc=
nOpNEJhoU0h+00S9E1YfgA==
xcvTpljkjIyEdvhp+VcGFtJC
bZxOHr5CtzY4
rOD304X0u1DN/m7cbA==
Knixl0HJyEOOiNckwk8GFtJC
S4JMDRNTUAol
Vp9wSwNZSfY7VIpX
0Nf/zlrpmpahnM+tpkYGFtJC
joXsuHiBcVp88DHEHMA7
yN8i9ppoZYHSSaqqk6NZnQ==
4UFEMfyKhSB4UovzjdabqolwhFtMH1M=
d3RiRcXCeR8wlgjEHMA7
eMUS8PSBPCe2rPg=
LCsR0X328UuSAmlf
/keifSXopayqjLt1EWQ=
x8Hdn0pOACh11lPPYXo=
NXkuHKtxYYAXG3hA
d5dE59banPxMmA==
0vJUL/UPu1HN/m7cbA==
cG3LiYu7/OkmhQ==
kcFYNbltO4XkzzLEHMA7
c3now24l3wQX9EW8E1YfgA==
6kE4FbVNNTmvwBldAWY=
KzTXxYN5AlmUlfA=
pN03EpAPvdoG3td9HG4=
HFxFE8xVAzYdmOSoxIRGsGfPrq2RWw==
QKMj+KSybRYojwTEHMA7
PYRSDRNTUAol
OU/wwlhkGLrLFHx6Y4tNmQ==
5SOc+gRCtzY4
Wpm/fyDn4/3+CVe5E1YfgA==
dYOdeSmnq2BbpQLEHMA7
5vBBzXlHCp/yEEZBRKetUjQ52IU0yTJk
bbmih0CBPMgoE2DLXmVpeGo=
4S2wkRvbxeLo00C8WmVpeGo=
uECyFReWXAol
jNu+mzKEhkrN/m7cbA==
4gAT76Z35fIJDFm5E1YfgA==
qADJh1HW2aS+D2Q1E1YfgA==
dcvSv2utZ/AJgMdevpFTnQ==
JTfVqz447pqn6T42UST9jGfPrq2RWw==
iY+7qTKHfAfwUMO7yWj3my2YHA==
WmeZXSgwNX67nd5C2U4GFtJC
7P/CoUpIP1lWSI3ch/yAAIOwONni
5+eJT9fhjh9hv9+SMWw=
Y3Z/PQTQl7DjzUC9SmVpeGo=
EiBDCpcTF6v40SzEHMA7
P2sC6LDSgQA7VIpX
5eWOfxDRj6Pp4VDbY2VpeGo=
dsEE1oKWIEAv
Ua2MVQydVIHU0DXEHMA7
hNkQ540Z0sNCG25K
b4tOMMbN0uY5lt+32djuHPtxAw==
teuvevj8CyJw4EUsE1YfgA==
tNsZ75ZlU1WpFoCBm1RaVsvskzc=
aLsI8IQZ0uL0yNd9HG4=
RUPKsWJ0gHa5LI2Nj0P5cFDOnsZ1AC62uw==
P5f+1WAqKEOSIzw7ZA==
Mdxb0fR4Aa8Zdu8=
carolinerosenstein.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2744 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31 PID 2860 wrote to memory of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31 PID 2860 wrote to memory of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31 PID 2860 wrote to memory of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31 PID 2860 wrote to memory of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31 PID 2860 wrote to memory of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31 PID 2860 wrote to memory of 2744 2860 be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-