Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 08:50
Static task
static1
Behavioral task
behavioral1
Sample
QYqXYpTo9nLX2kX.exe
Resource
win7-20240903-en
General
-
Target
QYqXYpTo9nLX2kX.exe
-
Size
554KB
-
MD5
7fda0310485ec8de0a5bc10e1d027284
-
SHA1
3ada290a132e69fd88b5c9f8beac4ea2ee3655de
-
SHA256
50b35f848446146fece2aef6b039a20230bad0040cdd39084675a466792cff52
-
SHA512
6b9b7f0ce3959fab35bb961f53500c5a7ffc605698f765f59d661e4dd07e4408628cd1a0ae24b9cdbcaddce7973fd2154f3730901a3ef0e4cb0c2ddb125a826d
-
SSDEEP
12288:hw5d04ufAI2LK5Td3suvB+1rA5fgZQTDVlGF7u2GfGZyVgIRi:y5d+fAtm5p3sceAFgQhgF7ulGZaR
Malware Config
Extracted
formbook
4.1
oy30
rfc234.top
danielcavalari.com
elperegrinocabo.com
aryor.info
surelistening.com
premium-numero-telf.buzz
orlynyml.click
tennislovers-ro.com
holdmytracker.com
eewapay.com
jaimesinstallglass.com
damactrade.net
swapspecialities.com
perfumesrffd.today
salesfactory.pro
supportive-solutions.com
naiol.com
khoyr.com
kalendeargpt44.com
web-tech-spb.store
lodjireal.online
ultraflooringmore.com
iwantbundles.com
theroofer.lat
qwxry.fun
faserfreunde.com
body-for-living.com
welnessfit.com
clublucky.store
nlast.cyou
gkoders.com
okxmttwa.click
nodesofty.com
alemania-paredes.com
travel-insuranceprice.shop
thechaay.com
formulavsupplements.com
gstringtheory.com
ruopenai.com
evi-based.com
danleugers.com
lojinhaevelyn.com
denzaimivsem.buzz
izmn2vd8.click
asliy.top
kawitrack.com
brandiai.com
ssssne.com
asianewsgood.online
proloop.work
dhikaedwina.com
onemarinallc.com
realmpabq.com
boswells.biz
jpxiaoxi.top
ishirink.com
thundershorts.com
rainydayroofs.com
atatra.com
hftroi.xyz
fundamentplus.com
gsvaedpzugtdn.com
mic-reform.info
vacuumbagsuppliers.com
gaoxiba150.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4924-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4924-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4924-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1644-28-0x0000000000700000-0x000000000072F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3092 set thread context of 4924 3092 QYqXYpTo9nLX2kX.exe 92 PID 4924 set thread context of 3480 4924 QYqXYpTo9nLX2kX.exe 56 PID 4924 set thread context of 3480 4924 QYqXYpTo9nLX2kX.exe 56 PID 1644 set thread context of 3480 1644 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QYqXYpTo9nLX2kX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3092 QYqXYpTo9nLX2kX.exe 3092 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 4924 QYqXYpTo9nLX2kX.exe 1644 cmd.exe 1644 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3092 QYqXYpTo9nLX2kX.exe Token: SeDebugPrivilege 4924 QYqXYpTo9nLX2kX.exe Token: SeDebugPrivilege 1644 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3480 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4912 3092 QYqXYpTo9nLX2kX.exe 91 PID 3092 wrote to memory of 4912 3092 QYqXYpTo9nLX2kX.exe 91 PID 3092 wrote to memory of 4912 3092 QYqXYpTo9nLX2kX.exe 91 PID 3092 wrote to memory of 4924 3092 QYqXYpTo9nLX2kX.exe 92 PID 3092 wrote to memory of 4924 3092 QYqXYpTo9nLX2kX.exe 92 PID 3092 wrote to memory of 4924 3092 QYqXYpTo9nLX2kX.exe 92 PID 3092 wrote to memory of 4924 3092 QYqXYpTo9nLX2kX.exe 92 PID 3092 wrote to memory of 4924 3092 QYqXYpTo9nLX2kX.exe 92 PID 3092 wrote to memory of 4924 3092 QYqXYpTo9nLX2kX.exe 92 PID 3480 wrote to memory of 1644 3480 Explorer.EXE 94 PID 3480 wrote to memory of 1644 3480 Explorer.EXE 94 PID 3480 wrote to memory of 1644 3480 Explorer.EXE 94 PID 1644 wrote to memory of 1824 1644 cmd.exe 95 PID 1644 wrote to memory of 1824 1644 cmd.exe 95 PID 1644 wrote to memory of 1824 1644 cmd.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\QYqXYpTo9nLX2kX.exe"C:\Users\Admin\AppData\Local\Temp\QYqXYpTo9nLX2kX.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\QYqXYpTo9nLX2kX.exe"C:\Users\Admin\AppData\Local\Temp\QYqXYpTo9nLX2kX.exe"3⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\QYqXYpTo9nLX2kX.exe"C:\Users\Admin\AppData\Local\Temp\QYqXYpTo9nLX2kX.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QYqXYpTo9nLX2kX.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-