Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 07:57
Static task
static1
Behavioral task
behavioral1
Sample
346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe
Resource
win7-20240903-en
General
-
Target
346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe
-
Size
1.0MB
-
MD5
d21e850ec672153fc40406d9307be42b
-
SHA1
fd56cf57e537b7e24c416bb60cb278320c42a57a
-
SHA256
346e804f385a59deed6eeefac709ffd18468bbefd31a62b3adad7232ba5e6245
-
SHA512
614d3280893562c9dde062ccd453d3c2306ec7b9538ce06f8d6eb54285c3987385ac1fd4d039c234ca29b6a08fac9d6bde4e15be200e156f754ab8b388dafdf9
-
SSDEEP
24576:Q4lavt0LkLL9IMixoEgeaHdf91hplyQxbKq9MmCS:Hkwkn9IMHeaHdlnyQxOaPCS
Malware Config
Extracted
formbook
4.1
kr28
8pehzswy1.com
charliebluewellness.net
telehealthtravel.com
d6ir07.vip
consciouscapital.observer
and-good.world
metapod.fm
ereccprime.us
nihb.tokyo
tsbot.us
lkbc.store
lev-casino-qjm.buzz
freshfit.co.za
novinlopik.store
surrealfurrealart.com
endless-garage.com
newlaunchinthane.co.in
diamondtalesstore.com
yooyarkyoodai.com
hippomarketplace.shop
sgi-design-studio.com
stasikbros.com
carleeberthany.cyou
djsartin.com
kissimmeeseamlessgutter.com
copilote-mia.com
betplaceonlinebook.in
cancerisac.net
lgaytonintdes.com
jhbw.online
mayuzumi1347.site
gdofunspotlight.fun
urakata-biz.com
est-officia.site
funtimgame.online
gobraincptl.com
grass-landscaping-104908.world
abaitspecialists.com
sram2he1jc.top
newfashion360.com
anikbellavance.biz
zrelieporno.xyz
107setget.top
kders2ll.shop
thc-mediasolutions.com
decarbmare.com
myoffices.in
xn--cks903hcga.xn--55qx5d
advantedge-design.com
togetherwecarehomecare.com
amendes-retards.com
henriteinturier.com
maggylondon.shop
missstrangefitness.com
bvaflubo.com
thecltbizpod.com
maticpremium.online
hartylio.com
fgdsa.xyz
gamblingleague.net
snaprecover.com
farmaciaalarcon.com
zephyrellas.com
zqzmark.shop
keysquare.co
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1488-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1488-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2300-19-0x0000000000940000-0x000000000096F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2440 set thread context of 1488 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 1488 set thread context of 3452 1488 svchost.exe 54 PID 2300 set thread context of 3452 2300 wscript.exe 54 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4068 2440 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1488 svchost.exe 1488 svchost.exe 1488 svchost.exe 1488 svchost.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe 2300 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 1488 svchost.exe 1488 svchost.exe 1488 svchost.exe 2300 wscript.exe 2300 wscript.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1488 svchost.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeDebugPrivilege 2300 wscript.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1488 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 2440 wrote to memory of 1488 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 2440 wrote to memory of 1488 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 2440 wrote to memory of 1488 2440 346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe 82 PID 3452 wrote to memory of 2300 3452 Explorer.EXE 86 PID 3452 wrote to memory of 2300 3452 Explorer.EXE 86 PID 3452 wrote to memory of 2300 3452 Explorer.EXE 86 PID 2300 wrote to memory of 3324 2300 wscript.exe 89 PID 2300 wrote to memory of 3324 2300 wscript.exe 89 PID 2300 wrote to memory of 3324 2300 wscript.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\346E804F385A59DEED6EEEFAC709FFD18468BBEFD31A62B3ADAD7232BA5E6245.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 8123⤵
- Program crash
PID:4068
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2440 -ip 24401⤵PID:2448