Analysis
-
max time kernel
360s -
max time network
361s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 00:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
6086e2101717fd208b1f2b27d236d242.exe
Resource
win7-20240903-en
General
-
Target
6086e2101717fd208b1f2b27d236d242.exe
-
Size
586KB
-
MD5
6086e2101717fd208b1f2b27d236d242
-
SHA1
b47eb5dad7656f4ea4f520bffa2df5217c611efb
-
SHA256
712f4edfc3c0a1ad54060809bb9c39b0a1a355c8ebcb2cc377f100215a3f4150
-
SHA512
63a7e54bfc1693cb8e818fb95e843fa8b791ef07996073326c944b702dd53e1cafd794bc46611836311e5e2b057684cef06998a40647cd0ba09ff4ea3da2f96d
-
SSDEEP
12288:RfhpMHL/F+METLZNFKK/JFieyX7CXpCe9zJVGTP:gL/F+MEdV/JGrCXgeBJW
Malware Config
Extracted
formbook
4.1
mj25
resencepeople.net
okebowlkoning.online
owevrcast.store
ynursery.xyz
isefyxerprotech.info
nventrobots-br.xyz
rojetos3d.shop
confyxerengine.info
litdugunsalonu.xyz
uporexinaluvo.click
attwecan.net
r154359.xyz
airtidy.store
headvancestore.shop
urolube.xyz
apnovis.online
adychef.shop
armhouse.world
unspotgambit.top
nline-dating-for-now.today
cicoon.live
602vuvetyy.pro
cdx4.site
ficonta.academy
riceradargeniusnow.xyz
43jknf137r.shop
rackyourbestofferinstantly.xyz
entors.services
etworktechnoki.pro
oelsharon.online
ecksbadgirls.net
dsigngroup.net
luffychao.online
oxgoblin.net
irtuousdesigns.net
fjjrrgc.shop
avabet168.london
rampedc.store
axpnqq.business
ythought.online
ogel.ltd
ebwcn.shop
16mb.top
ysnova.online
hejhls.top
uanyang.store
implyoganicbeautyl.shop
obatopup.store
uturelumen.net
yyjdrtcee.xyz
ioace-it.net
usthavelist.app
ephagallery.online
ggbj.top
ilmeonlibe.online
xbet-pxd.top
ezpravru10.top
eb3aipop.top
omfycoffeecorner.site
rtxcd.xyz
rok3.mobi
cientific-ethics.online
aa576ev5.top
gobpb.top
xploreshipscienceteam.info
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/292-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3012 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1840 set thread context of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6086e2101717fd208b1f2b27d236d242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1840 6086e2101717fd208b1f2b27d236d242.exe 1840 6086e2101717fd208b1f2b27d236d242.exe 1840 6086e2101717fd208b1f2b27d236d242.exe 1840 6086e2101717fd208b1f2b27d236d242.exe 292 6086e2101717fd208b1f2b27d236d242.exe 3012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1840 6086e2101717fd208b1f2b27d236d242.exe Token: SeDebugPrivilege 3012 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3012 1840 6086e2101717fd208b1f2b27d236d242.exe 31 PID 1840 wrote to memory of 3012 1840 6086e2101717fd208b1f2b27d236d242.exe 31 PID 1840 wrote to memory of 3012 1840 6086e2101717fd208b1f2b27d236d242.exe 31 PID 1840 wrote to memory of 3012 1840 6086e2101717fd208b1f2b27d236d242.exe 31 PID 1840 wrote to memory of 2716 1840 6086e2101717fd208b1f2b27d236d242.exe 33 PID 1840 wrote to memory of 2716 1840 6086e2101717fd208b1f2b27d236d242.exe 33 PID 1840 wrote to memory of 2716 1840 6086e2101717fd208b1f2b27d236d242.exe 33 PID 1840 wrote to memory of 2716 1840 6086e2101717fd208b1f2b27d236d242.exe 33 PID 1840 wrote to memory of 1776 1840 6086e2101717fd208b1f2b27d236d242.exe 34 PID 1840 wrote to memory of 1776 1840 6086e2101717fd208b1f2b27d236d242.exe 34 PID 1840 wrote to memory of 1776 1840 6086e2101717fd208b1f2b27d236d242.exe 34 PID 1840 wrote to memory of 1776 1840 6086e2101717fd208b1f2b27d236d242.exe 34 PID 1840 wrote to memory of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35 PID 1840 wrote to memory of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35 PID 1840 wrote to memory of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35 PID 1840 wrote to memory of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35 PID 1840 wrote to memory of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35 PID 1840 wrote to memory of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35 PID 1840 wrote to memory of 292 1840 6086e2101717fd208b1f2b27d236d242.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"2⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"2⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:292
-