Analysis
-
max time kernel
267s -
max time network
260s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT_xlxs.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT_xlxs.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
General
-
Target
STATEMENT OF ACCOUNT_xlxs.exe
-
Size
888KB
-
MD5
2a63c7d093ec7a63a4fabf61452e2206
-
SHA1
501c0f22803da5b0ce77f915efac3567644c47ca
-
SHA256
a51862c42a347c96969bb5e511b81d1beb31d50f850acf4fbf041087911c92f0
-
SHA512
2bbfda19a986bec80b79beb33412fec220ab864ef15d3897a6e3e023e214a0fa7e0c4376d241476911ac5813571db1c07aa65aa8c00d62aaabdd668c5fe25a0f
-
SSDEEP
12288:lRrzL0BkOhDPswBw4nP/CBx21t+TZY44s2WvbcWqOOav/qjqPaK:lJzpOLi4m0fCZsNWpOaHqDK
Malware Config
Extracted
formbook
4.1
oa21
towinglyons.top
dunia-togel.xyz
alabnm.com
1stsole.com
uio3222d.store
little9.site
educationexperienced.com
tjautoline.com
twinzcreationzllc.com
sinsegoldenwolf.com
seeks6.studio
monetatowing.top
hqgroupiq.com
e8f4.com
mayasaccessoriesofficial.com
cribllc.us
homeremodelee.today
etl8ryc.site
danielbrennerreality.com
telcotechmelboure.store
q0ld.site
ansiedadepsicologia.online
00852kjh.com
kristacare.online
cookfranschhoek.com
superstarweed.com
theheatwavepack.com
cte106.vip
tarotpersonalities.com
jteungyt.com
t138.site
der-schoepfer.com
abbasabedini.com
mysticslight.com
mo61753.com
huberprivatecapital.com
lybhsh.com
sexymize.com
kwkstarter.com
pisck6u.sbs
getsilkywaytoday.com
sunglassesclipcheap.com
atxstem.com
yyll0.site
116zy.com
seyret5.top
kodamin.com
lexiop.online
yourecreation.com
mil58.vip
xmpp42.site
leningrad-spb.com
ratu123.ltd
6rpr.site
cntm077.xyz
e1fbar.com
mauroviviani.info
ubmk123.xyz
desouzaproductions.com
immaculatedwellings.com
cottonfruits.com
kennedy-towing.top
cherryridgele.com
glittergrid.com
tswwmvdo.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1492-627-0x0000000000400000-0x0000000001462000-memory.dmp formbook behavioral1/memory/1492-630-0x0000000000400000-0x0000000001462000-memory.dmp formbook behavioral1/memory/1732-637-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/1732-639-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1312 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 3052 STATEMENT OF ACCOUNT_xlxs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\subfolder1\\Hirsling.exe" STATEMENT OF ACCOUNT_xlxs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1492 STATEMENT OF ACCOUNT_xlxs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3052 STATEMENT OF ACCOUNT_xlxs.exe 1492 STATEMENT OF ACCOUNT_xlxs.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3052 set thread context of 1492 3052 STATEMENT OF ACCOUNT_xlxs.exe 28 PID 1492 set thread context of 1196 1492 STATEMENT OF ACCOUNT_xlxs.exe 15 PID 1732 set thread context of 1196 1732 colorcpl.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 1492 STATEMENT OF ACCOUNT_xlxs.exe 1492 STATEMENT OF ACCOUNT_xlxs.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe 1732 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3052 STATEMENT OF ACCOUNT_xlxs.exe 1492 STATEMENT OF ACCOUNT_xlxs.exe 1492 STATEMENT OF ACCOUNT_xlxs.exe 1492 STATEMENT OF ACCOUNT_xlxs.exe 1732 colorcpl.exe 1732 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 STATEMENT OF ACCOUNT_xlxs.exe Token: SeDebugPrivilege 1732 colorcpl.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1492 3052 STATEMENT OF ACCOUNT_xlxs.exe 28 PID 3052 wrote to memory of 1492 3052 STATEMENT OF ACCOUNT_xlxs.exe 28 PID 3052 wrote to memory of 1492 3052 STATEMENT OF ACCOUNT_xlxs.exe 28 PID 3052 wrote to memory of 1492 3052 STATEMENT OF ACCOUNT_xlxs.exe 28 PID 3052 wrote to memory of 1492 3052 STATEMENT OF ACCOUNT_xlxs.exe 28 PID 3052 wrote to memory of 1492 3052 STATEMENT OF ACCOUNT_xlxs.exe 28 PID 1196 wrote to memory of 1732 1196 Explorer.EXE 30 PID 1196 wrote to memory of 1732 1196 Explorer.EXE 30 PID 1196 wrote to memory of 1732 1196 Explorer.EXE 30 PID 1196 wrote to memory of 1732 1196 Explorer.EXE 30 PID 1732 wrote to memory of 1312 1732 colorcpl.exe 32 PID 1732 wrote to memory of 1312 1732 colorcpl.exe 32 PID 1732 wrote to memory of 1312 1732 colorcpl.exe 32 PID 1732 wrote to memory of 1312 1732 colorcpl.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"3⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"3⤵
- Deletes itself
PID:1312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44B
MD5eb4da25d6c0d919bbe9ebc480cee0d05
SHA1dfaeae9c23e9b282a82b1abb971599a5bcd51b27
SHA25670a4ee88b132159f110d96ad83001187c6a272f52d5c766f563b50ac1e072fe3
SHA5121e9972196d4bdbbc7366c1fc980014b3048d036f56afdeb39303263cc7af24217490dd9b9ca85ac11a0bf83a1c31eead3320e158e8b9ac819468023d1548cb5c
-
Filesize
78B
MD5bb31c56868208274e7db9562b2d6928e
SHA192de51663b04d18740e4a3130966a01d7820d619
SHA25666c13b9b8b4a293e8779ea59b23c13a92147af5d14f6b9a53e901dd67eb8a91e
SHA512824b2360eb53f6995e80d61ce0a789700f87add6bde8adc54d6bcf4e787d7df34f8571a07a2fd657c4f51853059ccd22901cebdf7b67d561ef2cadbd7f650992
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9