Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 19:28
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20240708-en
General
-
Target
download.exe
-
Size
181KB
-
MD5
794a509c76fc3641f14213e292cd2f96
-
SHA1
f714ddd2d33e9b819699b1988604c637d8883b09
-
SHA256
bcc71963343b162d9af725b69399e104ad4a9718ada6a764d3a0478500d96661
-
SHA512
5af28cc79606b82b1a8d60c2b22fecfc1c5a4e7b76f8df46b2d350657081c1fa937457a06f27d768b2ac47f6c8867ccfacc9b91e9e9002cabeb84d77b230a305
-
SSDEEP
3072:wpNDBJOQwi4pR0SsBeh9A9KoEjbhi/14fEMdSId8zOISCnmkJTV:+F+RpsUha9Knbhi/14fMIEhJnmS
Malware Config
Extracted
formbook
4.1
slpb
specialhelmets.com
advancedfiberglassproducts.com
guelphneurotraining.com
yishan1314.com
1728025.com
drawbeirut.com
bacb.online
calsury.com
health-helper.net
athapparels.com
kwunitedtraining.com
locqueenpl.com
kastamonuekingrup.com
planctheatreproject.com
puschistiki.com
mutlob.com
naturalbuttonecuador.com
smellssoclean.com
rishpure.com
weldvolt.com
best20onlinetherapy.com
kalilalashes.com
amrcanvas.com
anextrasetofhandsyyc.com
peripheralshubham.com
armyofoutcasts.com
neatdrop.com
viralnaekonomija.com
pgupcvbvyvjlja.pro
presupuestospublicos.com
energiaziemi.com
ribbonsofthought.com
contentgroups.com
rokupian.com
ivoireprotection.com
greenbarmiami.com
xn--yetkiliblgeservisi-k3b.com
alzxw.com
listingallauto.com
chipcenter.net
battagliafootwear.com
kelsonarts.com
cigarettes-on-line.com
planithomedesignstudio.com
doculine.net
princeofnaples.com
thirdagemojo.com
cimerkartaidatbasvurulari.com
idmcrack.xyz
vitalansweringservice.com
zimsmall.com
couldpronounced.life
biex-solutions.com
xn--dcktbzera5mu847cgbf.online
dteenpatti.com
sounds2dream.com
papayaapp.pro
dogwellfare.com
joe-mala.com
qimkoev.com
researchfarm.net
bandhcontractorsplus.com
trinitykaii.com
folanimon.com
czpls.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/716-2-0x0000000000CB0000-0x0000000000CDE000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 716 set thread context of 3544 716 download.exe 56 PID 2000 set thread context of 3544 2000 explorer.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 716 download.exe 716 download.exe 716 download.exe 716 download.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 716 download.exe 716 download.exe 716 download.exe 2000 explorer.exe 2000 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 716 download.exe Token: SeDebugPrivilege 2000 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2000 3544 Explorer.EXE 83 PID 3544 wrote to memory of 2000 3544 Explorer.EXE 83 PID 3544 wrote to memory of 2000 3544 Explorer.EXE 83 PID 2000 wrote to memory of 944 2000 explorer.exe 85 PID 2000 wrote to memory of 944 2000 explorer.exe 85 PID 2000 wrote to memory of 944 2000 explorer.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\download.exe"C:\Users\Admin\AppData\Local\Temp\download.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\download.exe"3⤵
- System Location Discovery: System Language Discovery
PID:944
-
-