Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
SKM_C224e2104221317034443434434342244347.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SKM_C224e2104221317034443434434342244347.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/pesaakdq.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/pesaakdq.dll
Resource
win10v2004-20241007-en
General
-
Target
SKM_C224e2104221317034443434434342244347.exe
-
Size
254KB
-
MD5
b312e3f54db0e9ba83b2a454b5de4bf1
-
SHA1
d5e9f1c71b6fc9b30c61a7267a4b5b032a611c9f
-
SHA256
6a06e74bde0a136b6d9b96b6093e1fc6d09f78adb6b167adcf82106356de3388
-
SHA512
5155e3aa8bd6a5c405bfbe92c66ad6e616b6e3c8c07d7ec5a54e09c247f8c3e514696e4104a71903f5f22f38085c68529f1df6eae46cc1edeb89725b76423e8e
-
SSDEEP
6144:wBlL/chrXUIY+prolgrBh6tikiWFNXiWX8+:Ceh2+prOsz6ckZzSWX8+
Malware Config
Extracted
formbook
4.1
a2d5
theplam.com
kfmlegal.com
labottega.xyz
hhhtshg.com
kamerabudi.site
advancedsportz.com
hyperactive.life
mintyjazz.com
ashhpega.xyz
jbo.mobi
longthienvn.com
edwanflorist.com
sonyahfond.com
thezebraeffect.com
techgadgetssolutions.online
sekshikayeara.com
tavrida.xyz
vesulyo.xyz
pomegranatenoir.com
kaapcabins.com
lgbtassociatessecurity.com
mediphrases.com
xoal.link
pontoonlivity.com
vietdebtcollection.com
yzsjsh.com
ecobuh.art
simecudu.xyz
gmlit.com
faceverse.ltd
relzympen.com
gladysnwwright.store
theindigy.online
discordmarket.xyz
apexfundraiser.info
upiaxis.com
zioncanyongoldendoodles.com
bd321regbiz-scene.com
l7antminer.com
supportablackwoman.com
slushpuppiecompany.com
thecontentedcook.com
srisriyantra.com
americantreecompany.rest
vissel-lab.net
kmhgay.com
brccomplex.com
alpecasac.com
exponius.xyz
priscillareviews.com
pony-studio.com
hausaawa24tv.com
aquariumgallerykhulna.com
nafissadiqueshatil.com
bl01.net
cincyslingers.com
doler.info
wlcblnmu.com
gobee.green
stablyhome.xyz
studiotesta.net
servicechexreports.com
serviciopft.online
reflexo-massage.com
bhgyrr.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1440-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2372 SKM_C224e2104221317034443434434342244347.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKM_C224e2104221317034443434434342244347.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1440 SKM_C224e2104221317034443434434342244347.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31 PID 2372 wrote to memory of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31 PID 2372 wrote to memory of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31 PID 2372 wrote to memory of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31 PID 2372 wrote to memory of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31 PID 2372 wrote to memory of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31 PID 2372 wrote to memory of 1440 2372 SKM_C224e2104221317034443434434342244347.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5184b758268965aca6018f69dfe7d18d3
SHA13a25a53a14f5639ff368a33e8ec8a806d059c7eb
SHA256a8d25a38820df99aa1b1be9dce4a30a99ec01c11287fe75cbdf02f8120e4935d
SHA512aca7cee419ed6bd1bfe30f25d1cd59f8a5e98c88ba1c786e3f9b5814fd316d26d7e013ab6b85a475dddd598756ee4f3fea8027dbb693d54f6fd09e094cb65e85