Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe
Resource
win7-20240903-en
General
-
Target
e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe
-
Size
522KB
-
MD5
a69f3b88a6774d10b9b0bb6c48b196e7
-
SHA1
030e5beded6ba62db2bfc9862a83f5a6c6e29ca6
-
SHA256
e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1
-
SHA512
40f4dbe20b5edbc359423fb24639bf0f9caa282b560be8f471ee5e5ea352cba8a4842aa0980a6c62e83607195be5c52b9a81d6cc6b0c22a082a8bb138be25f0a
-
SSDEEP
6144:eY6YpD2FXImLrfqldiQ+vvgFLKBsD1wf9KWj0hxD2Hn8mWFMLppQylXQYdMkfU:1WImHLQEgsowf94xHmZplxQ+H
Malware Config
Extracted
formbook
4.1
cr35
tahirsoemantrigroup.com
hashtagstartup.net
guron.biz
donwalin.com
aslanrefinedhomes.com
quitrobo.com
transcriptionservicesindia.com
mooremedications.com
mahounoniwa.com
lowpricepath.com
xinmanxin.com
maliya-interiors.com
rkprops.com
functionsandfoundations.com
thelenditudenews.com
streetlogic.biz
itaste.xyz
protokolavukatlik.com
reformasmende.com
noahsicecream.com
medtize.com
transportmetspoed.com
nnaa807.com
sorialab12.online
fuckingmyself.com
sagapolimer.com
e5-construction.com
bitracks56.com
noonautica.info
ijournaltnpasumo5.xyz
anyoneh.com
officesetupofficesetup.com
biurowe.online
hackensackbarber.com
changeproduct.store
drayeshaafzal.com
niasara.com
magstyletravelingllc.com
ottowagnergruende.wien
quinube.online
bestprodutos.com
qualitybilisim.com
fornecedoresbr.online
hugsforbubbs.com
studiosagesalon.com
jonathanandlola.info
potcreekfarms.com
digitalpravin.online
zerogamesober.com
hghbj.com
vnpmhs.com
publicdefenderprivacy.com
520kouzi.com
atomicpropertiescarrboro.com
schemesoliddrug.xyz
dermocosmethicbio.com
aokmangearbox.com
subconsciousgod.com
storiedpklnfo.xyz
qabooscapitalgroups.com
frjrbfkfncifnsnqwnxbcbckfi.com
mey.agency
wsfilmes.website
ankaraotelescort.xyz
tllyou.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1484-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2340 set thread context of 1484 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 1484 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 1484 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1484 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 96 PID 2340 wrote to memory of 1484 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 96 PID 2340 wrote to memory of 1484 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 96 PID 2340 wrote to memory of 1484 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 96 PID 2340 wrote to memory of 1484 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 96 PID 2340 wrote to memory of 1484 2340 e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe"C:\Users\Admin\AppData\Local\Temp\e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe"C:\Users\Admin\AppData\Local\Temp\e4f478b7cd658cb31bc1192e16ccc1509d552a7229a92fea1a3c6224ee7591a1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-