Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 07:57
Static task
static1
Behavioral task
behavioral1
Sample
346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe
Resource
win7-20240903-en
General
-
Target
346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe
-
Size
1.0MB
-
MD5
d21e850ec672153fc40406d9307be42b
-
SHA1
fd56cf57e537b7e24c416bb60cb278320c42a57a
-
SHA256
346e804f385a59deed6eeefac709ffd18468bbefd31a62b3adad7232ba5e6245
-
SHA512
614d3280893562c9dde062ccd453d3c2306ec7b9538ce06f8d6eb54285c3987385ac1fd4d039c234ca29b6a08fac9d6bde4e15be200e156f754ab8b388dafdf9
-
SSDEEP
24576:Q4lavt0LkLL9IMixoEgeaHdf91hplyQxbKq9MmCS:Hkwkn9IMHeaHdlnyQxOaPCS
Malware Config
Extracted
formbook
4.1
kr28
8pehzswy1.com
charliebluewellness.net
telehealthtravel.com
d6ir07.vip
consciouscapital.observer
and-good.world
metapod.fm
ereccprime.us
nihb.tokyo
tsbot.us
lkbc.store
lev-casino-qjm.buzz
freshfit.co.za
novinlopik.store
surrealfurrealart.com
endless-garage.com
newlaunchinthane.co.in
diamondtalesstore.com
yooyarkyoodai.com
hippomarketplace.shop
sgi-design-studio.com
stasikbros.com
carleeberthany.cyou
djsartin.com
kissimmeeseamlessgutter.com
copilote-mia.com
betplaceonlinebook.in
cancerisac.net
lgaytonintdes.com
jhbw.online
mayuzumi1347.site
gdofunspotlight.fun
urakata-biz.com
est-officia.site
funtimgame.online
gobraincptl.com
grass-landscaping-104908.world
abaitspecialists.com
sram2he1jc.top
newfashion360.com
anikbellavance.biz
zrelieporno.xyz
107setget.top
kders2ll.shop
thc-mediasolutions.com
decarbmare.com
myoffices.in
xn--cks903hcga.xn--55qx5d
advantedge-design.com
togetherwecarehomecare.com
amendes-retards.com
henriteinturier.com
maggylondon.shop
missstrangefitness.com
bvaflubo.com
thecltbizpod.com
maticpremium.online
hartylio.com
fgdsa.xyz
gamblingleague.net
snaprecover.com
farmaciaalarcon.com
zephyrellas.com
zqzmark.shop
keysquare.co
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2896-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2896-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3012-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2840 set thread context of 2896 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 30 PID 2896 set thread context of 1212 2896 svchost.exe 21 PID 3012 set thread context of 1212 3012 cmmon32.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2896 svchost.exe 2896 svchost.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe 3012 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 2896 svchost.exe 2896 svchost.exe 2896 svchost.exe 3012 cmmon32.exe 3012 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2896 svchost.exe Token: SeDebugPrivilege 3012 cmmon32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2896 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 30 PID 2840 wrote to memory of 2896 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 30 PID 2840 wrote to memory of 2896 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 30 PID 2840 wrote to memory of 2896 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 30 PID 2840 wrote to memory of 2896 2840 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 30 PID 1212 wrote to memory of 3012 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3012 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3012 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3012 1212 Explorer.EXE 31 PID 3012 wrote to memory of 2632 3012 cmmon32.exe 32 PID 3012 wrote to memory of 2632 3012 cmmon32.exe 32 PID 3012 wrote to memory of 2632 3012 cmmon32.exe 32 PID 3012 wrote to memory of 2632 3012 cmmon32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-