Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 04:02
Static task
static1
Behavioral task
behavioral1
Sample
d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe
Resource
win7-20240903-en
General
-
Target
d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe
-
Size
1.7MB
-
MD5
5e87fce7bcc2c37521999ef3df14806a
-
SHA1
dbaba7033d7e78eb5934d2d8ebeb814ecd9ab68e
-
SHA256
d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821
-
SHA512
c47a13c15a4f7423bb564c7b19f8170a9a8cb6351b247cbc2a55341e624aee4580cb21ac0a775afa9b43f8340b0dca076b40e87a5d890cab5a42c86f796bf7a4
-
SSDEEP
24576:hqDEvCTbMWu7rQYlBQcBiT6rprG8aR1AdKVsRz7X58ggdSjWuve:hTvC/MTQYxsWR7aRidKVsRzz5RgE6u
Malware Config
Extracted
formbook
4.1
no84
odalis.solutions
arehouse-inventory-39660.bond
uzcobrands.store
ersonaformosa.net
assiveincome.video
ro-staff-lp.net
aapp.cloud
leaning-jobs-55001.bond
nfluencer-marketing-14840.bond
ebmyadmin.online
djl.info
aulocandotii.info
ecurity-apps-72506.bond
arketwise.sbs
temcellsusa.net
fagame888.net
eelsbalance.online
nternetempauta.online
uivision.net
pfjc.info
esiarbet17.pro
paziodibellegroup.store
itchify.store
ormfactory.live
idea.xyz
rain-pipe-cleaning-16717.bond
woi.xyz
ental-health-22528.bond
ointelegraph-mail63302.net
martlandsbygd.net
epresio.xyz
odp4qbt.xyz
mmd.xyz
ivaolivia.info
ueren174.sbs
ameras-70095.bond
mazcakesjars.info
rd0505.today
weqpo.xyz
ingavpost.live
-c.asia
lsite.video
active.xyz
utrasys.net
eguidoresarg.store
oofsy.store
aayasna-alex1.rest
pinhere.online
usticcopperaura.online
on.game
ivechatapps-9751027.zone
lx.productions
nedastore.online
rcareafni.net
efapay.vip
elerin.xyz
foondemand.xyz
nfluencer-marketing-53877.bond
genz.club
arkerorganizer.shop
ersonalconsult.tech
aerxy555kc.shop
cowaris.net
ojakings.shop
redia.biz
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4776-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4776-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4776-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4288-17-0x00000000003B0000-0x00000000003DF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 64 set thread context of 4776 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 82 PID 4776 set thread context of 3468 4776 svchost.exe 56 PID 4776 set thread context of 3468 4776 svchost.exe 56 PID 4288 set thread context of 3468 4288 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4776 svchost.exe 4776 svchost.exe 4776 svchost.exe 4776 svchost.exe 4776 svchost.exe 4776 svchost.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe 4288 wlanext.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 4776 svchost.exe 4776 svchost.exe 4776 svchost.exe 4776 svchost.exe 4288 wlanext.exe 4288 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4776 svchost.exe Token: SeDebugPrivilege 4288 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 64 wrote to memory of 4776 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 82 PID 64 wrote to memory of 4776 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 82 PID 64 wrote to memory of 4776 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 82 PID 64 wrote to memory of 4776 64 d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe 82 PID 3468 wrote to memory of 4288 3468 Explorer.EXE 83 PID 3468 wrote to memory of 4288 3468 Explorer.EXE 83 PID 3468 wrote to memory of 4288 3468 Explorer.EXE 83 PID 4288 wrote to memory of 3884 4288 wlanext.exe 84 PID 4288 wrote to memory of 3884 4288 wlanext.exe 84 PID 4288 wrote to memory of 3884 4288 wlanext.exe 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe"C:\Users\Admin\AppData\Local\Temp\d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\d4d75559f75b84b857c8f2423c1311043845b02f1ebb4ca6bbe0b41ad8cda821.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3884
-
-