Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 03:52
Static task
static1
Behavioral task
behavioral1
Sample
f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe
Resource
win7-20240903-en
General
-
Target
f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe
-
Size
1.3MB
-
MD5
6c307da605db691944e35458f2a5b772
-
SHA1
b89158e370a8658cf3a6ed2bb78925e004034905
-
SHA256
f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c
-
SHA512
2c3dc98e9850a509d30b556c5bbc0941735ef26cfcb45cf23392a1c9e23012dd46d9916792c5c559d5cb2a3b27b1d96bfdf7d89f9f1b01db7bfc2630b17dfe17
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aj1BV+opERjUD4TV3Y4M1:bTvC/MTQYxsWR7ajTkoUUwJY
Malware Config
Extracted
formbook
4.1
g49t
oast.now
11av1805.xyz
ourse.sale
nfoaldyfbvmdgfat.buzz
ntli.biz
apidrotation.net
ourmet94goodies.shop
eeksee.fun
aamahsa-emer6.rest
he-eyeofgod.online
ctofoot.net
ellnessdigitalmedia.store
0999yh.one
inghoki88.pro
sg.productions
basicwardrobe.club
itansofwisdom.fun
leaning-services-46734.bond
dinhk.online
arcelaamiga.shop
edicsanonymous.online
potloans.live
hermocontrol.xyz
arehouse-inventory-93551.bond
lockchain.xxx
om-tarewo.icu
ushmore.construction
rombeyond.xyz
epression-test-52238.bond
oiyter.xyz
etva.online
arbiequiz.shop
ransmediatupa.store
erali.rest
ox-packaging-jobs11.online
ebastianschlosser.xyz
hetrumpet.news
sefiorella.online
ifechanging.charity
5q04.net
jso.net
uantuminternship.online
bngy.shop
rabul.xyz
atxyzdes.live
ewrefope.xyz
dwardjrhuntley.online
erfectescapes.vacations
ntfqz.info
linds-curtains-47952.bond
nsidechina.online
ickanddrive.online
oisv.info
irro.mobi
eqiachat3.christmas
hampioon-slotss.vin
rilens.online
ydhl.life
ormuladedesconectar.shop
epression-test-87609.bond
asik-eye-surgery-90605.bond
raveheart2.online
tejarat.online
raftmine.xyz
radantobin.photography
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1460-3-0x0000000000690000-0x00000000006BF000-memory.dmp formbook behavioral2/memory/1460-7-0x0000000000690000-0x00000000006BF000-memory.dmp formbook behavioral2/memory/4972-13-0x0000000000FA0000-0x0000000000FCF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1064 set thread context of 1460 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 83 PID 1460 set thread context of 3536 1460 svchost.exe 56 PID 4972 set thread context of 3536 4972 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1460 svchost.exe 1460 svchost.exe 1460 svchost.exe 1460 svchost.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe 4972 netsh.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 1460 svchost.exe 1460 svchost.exe 1460 svchost.exe 4972 netsh.exe 4972 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1460 svchost.exe Token: SeDebugPrivilege 4972 netsh.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1460 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 83 PID 1064 wrote to memory of 1460 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 83 PID 1064 wrote to memory of 1460 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 83 PID 1064 wrote to memory of 1460 1064 f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe 83 PID 3536 wrote to memory of 4972 3536 Explorer.EXE 84 PID 3536 wrote to memory of 4972 3536 Explorer.EXE 84 PID 3536 wrote to memory of 4972 3536 Explorer.EXE 84 PID 4972 wrote to memory of 1548 4972 netsh.exe 85 PID 4972 wrote to memory of 1548 4972 netsh.exe 85 PID 4972 wrote to memory of 1548 4972 netsh.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe"C:\Users\Admin\AppData\Local\Temp\f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-