Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 07:51
Static task
static1
Behavioral task
behavioral1
Sample
346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe
Resource
win7-20241010-en
General
-
Target
346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe
-
Size
1.0MB
-
MD5
d21e850ec672153fc40406d9307be42b
-
SHA1
fd56cf57e537b7e24c416bb60cb278320c42a57a
-
SHA256
346e804f385a59deed6eeefac709ffd18468bbefd31a62b3adad7232ba5e6245
-
SHA512
614d3280893562c9dde062ccd453d3c2306ec7b9538ce06f8d6eb54285c3987385ac1fd4d039c234ca29b6a08fac9d6bde4e15be200e156f754ab8b388dafdf9
-
SSDEEP
24576:Q4lavt0LkLL9IMixoEgeaHdf91hplyQxbKq9MmCS:Hkwkn9IMHeaHdlnyQxOaPCS
Malware Config
Extracted
formbook
4.1
kr28
8pehzswy1.com
charliebluewellness.net
telehealthtravel.com
d6ir07.vip
consciouscapital.observer
and-good.world
metapod.fm
ereccprime.us
nihb.tokyo
tsbot.us
lkbc.store
lev-casino-qjm.buzz
freshfit.co.za
novinlopik.store
surrealfurrealart.com
endless-garage.com
newlaunchinthane.co.in
diamondtalesstore.com
yooyarkyoodai.com
hippomarketplace.shop
sgi-design-studio.com
stasikbros.com
carleeberthany.cyou
djsartin.com
kissimmeeseamlessgutter.com
copilote-mia.com
betplaceonlinebook.in
cancerisac.net
lgaytonintdes.com
jhbw.online
mayuzumi1347.site
gdofunspotlight.fun
urakata-biz.com
est-officia.site
funtimgame.online
gobraincptl.com
grass-landscaping-104908.world
abaitspecialists.com
sram2he1jc.top
newfashion360.com
anikbellavance.biz
zrelieporno.xyz
107setget.top
kders2ll.shop
thc-mediasolutions.com
decarbmare.com
myoffices.in
xn--cks903hcga.xn--55qx5d
advantedge-design.com
togetherwecarehomecare.com
amendes-retards.com
henriteinturier.com
maggylondon.shop
missstrangefitness.com
bvaflubo.com
thecltbizpod.com
maticpremium.online
hartylio.com
fgdsa.xyz
gamblingleague.net
snaprecover.com
farmaciaalarcon.com
zephyrellas.com
zqzmark.shop
keysquare.co
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2352-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2352-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5112-19-0x00000000001A0000-0x00000000001CF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4896 set thread context of 2352 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 2352 set thread context of 3408 2352 svchost.exe 55 PID 5112 set thread context of 3408 5112 cmstp.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe 5112 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 5112 cmstp.exe 5112 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 svchost.exe Token: SeDebugPrivilege 5112 cmstp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2352 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 4896 wrote to memory of 2352 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 4896 wrote to memory of 2352 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 4896 wrote to memory of 2352 4896 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 3408 wrote to memory of 5112 3408 Explorer.EXE 83 PID 3408 wrote to memory of 5112 3408 Explorer.EXE 83 PID 3408 wrote to memory of 5112 3408 Explorer.EXE 83 PID 5112 wrote to memory of 1408 5112 cmstp.exe 84 PID 5112 wrote to memory of 1408 5112 cmstp.exe 84 PID 5112 wrote to memory of 1408 5112 cmstp.exe 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1408
-
-