Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 08:10
Static task
static1
Behavioral task
behavioral1
Sample
356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe
Resource
win7-20241010-en
General
-
Target
356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe
-
Size
940KB
-
MD5
3bd44d37c8c64efd3a94054c87e27ba3
-
SHA1
334e92ed8f7f49a76a1ee00bec7fd8903d90e9b3
-
SHA256
356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763
-
SHA512
057fafffb18cee4a0ce9c0295a50900448c992b7a9c395fe40fb6fdbaaf31dc4662afdf891e1b19e6b98e56a3e66193b3726217a5dbff992329af9b7b508f04a
-
SSDEEP
24576:pqL7IN453L28GRpNq7N6I+1wHGfkLKfd70b:0IN2K8GNied70
Malware Config
Extracted
formbook
4.1
a94w
elfast-cruisetours.today
uego.wtf
ealthcare-trends-21256.bond
enpuk.info
ealswithmeaning.net
lumber-jobs-54632.bond
q-test-45673.bond
chmollinger.info
sibot.tech
utomation-tools-92232.bond
urasiindo4dpools.net
tbldg.world
raffitishop.online
mwa.info
iloubloiu-im.monster
agprime.life
yshopva.xyz
onstruction-services-27125.bond
enet.xyz
ontentexclusive.shop
irect-mail.online
kysports.monster
mble.monster
rls.xyz
ramingfaith.shop
om-exchange-nft743640.sbs
ental-implants-49625.bond
oftstarters.net
ard-vale.net
oftware-download-42246.bond
etayes.net
mage2cut.xyz
nfluencer-marketing-58813.bond
ilefox.xyz
rofesyonelwebtasarimi.online
-ai.solutions
gjnp.info
razyfbteam.store
raphic-design-degree-15820.bond
ental-health-57875.bond
cline.xyz
78899.vip
utter-and-roof-cleaning.today
weqpo.xyz
22201111.xyz
5l0bblb.xyz
arehouse-inventory-57386.bond
ikart.xyz
honia.xyz
eekava.online
esiarbet17.live
emu.xyz
xilis.net
nnot.xyz
arktooll-es.store
wub.lat
nfopayout.website
e6s.lat
meshthapa.pro
houxiaoxiao.online
eyo.xyz
ibit.xyz
chmvhic.shop
vplay.tech
esignix.xyz
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2764-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 2764 1932 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2764 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 2764 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2764 1932 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 84 PID 1932 wrote to memory of 2764 1932 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 84 PID 1932 wrote to memory of 2764 1932 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 84 PID 1932 wrote to memory of 2764 1932 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 84 PID 1932 wrote to memory of 2764 1932 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 84 PID 1932 wrote to memory of 2764 1932 356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe"C:\Users\Admin\AppData\Local\Temp\356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe"C:\Users\Admin\AppData\Local\Temp\356b42b6824a606e883de088d6eba39d6aa9f65d6fa6af6c2b0144013d116763.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-