Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe
Resource
win7-20241010-en
General
-
Target
b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe
-
Size
1010KB
-
MD5
2aea248b2b590adf9f002bf12b8e7b88
-
SHA1
dfbb2f6619eddb467c77ea3cdab16085ccd391cf
-
SHA256
b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8
-
SHA512
2dd8799069f983587aa71facd5f7a68177a64c37a5c9ca1aff204c95753334f8c15ea68078aaa86faaeb2e274199577f9948a2ad537e16d125dfd1048cb0f9f4
-
SSDEEP
12288:s8rBWShXDy2iN5vjR1J6vpqnAoLzwW4CkvBYZxMulVr0fQ+NNBymuH37j7Qu:zzy1foBMAoLzT4CGBYZeAVofAmi7j7Q
Malware Config
Extracted
formbook
4.1
awqu
soltwin24horas.com
kaiget.com
majalahlangitan.com
preventable.top
caronandtom.com
2222k06.com
hdrezkart54ff.net
supermessage.xyz
dezeenb.com
bestatakes.xyz
californiasportsbar.com
hxg66.xyz
localxgirl.online
educ-ability.com
b2breferralshop.online
miamicollisioncenter.com
bjcxqcdb.com
barrineauparkbees.com
robotics6.com
web-bastler.com
jupiterchb.com
fuzzcloud.space
fin-clean.com
tudodebeleza.com
7msnpredazzite.sbs
zuvesite.site
apipain.com
w388-winnn.online
ibedes.com
dating4lonely.com
tomsshoesonsale.com
burakugan.com
camilalopez.online
mabghsjkshop.com
paulinemoroneyevents.com
medicalsurgeryprocedures-d.site
clintonfabian.com
chesapeakehi.com
tabgrabber.com
luckersgoldsurvey.top
fasciasupplements.com
wanzhoukaoyu520.com
3919m.com
froehlichbuilder.net
kendallsescorts.com
holywingz.online
richardvenner.com
yx5589.com
sodephoangnam.com
lucasdogrupo.store
cgambill.com
lehrent.com
vtc-capital.ltd
skyxproductions.com
manuelgutierrez.online
ashlyanddustin.com
hg59090.com
notsite.site
ainuer.com
convivialonlineconsulting.site
allcrickad.xyz
bp5cw.beauty
ladiosa.store
ovzdutsxshop.com
wolacannabis.net
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4960-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1296 set thread context of 4960 1296 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4960 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 4960 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4960 1296 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 102 PID 1296 wrote to memory of 4960 1296 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 102 PID 1296 wrote to memory of 4960 1296 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 102 PID 1296 wrote to memory of 4960 1296 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 102 PID 1296 wrote to memory of 4960 1296 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 102 PID 1296 wrote to memory of 4960 1296 b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe"C:\Users\Admin\AppData\Local\Temp\b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe"C:\Users\Admin\AppData\Local\Temp\b8278bf8900a451a507c52e5fe3e886cf2ee5b3f65488eaf9c288318e0fd52a8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-