Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
PO#A91641-MSKU9953077.exe
Resource
win7-20240708-en
General
-
Target
PO#A91641-MSKU9953077.exe
-
Size
428KB
-
MD5
5ccd1492d563b11ffdfd66d51aa370b5
-
SHA1
3a7441cb83f5ca0732e8826f164c087b077a69a5
-
SHA256
e777d588f24e21fdcc3add6de5b93d5fb498b594a59f03d02b5a7880bc5d5180
-
SHA512
11625c6391526fd798ed1d22b8df9a5278241b4b2ec0e37d1d8493ef5a7f1fad4f4d850c67713a431d38739a43d5b7e88394dc039de49ae986e7b215be2f5444
-
SSDEEP
6144:cbhdbMroO/lGquzY2ZmmjrmQGnHpnP6aupTzqfU0IgDKTTVz6TRvdqs0QC+VkTfW:IbMrQHzY2ZDgR6aKiIgDQVyYAkTfg
Malware Config
Extracted
formbook
4.1
ergs
oceanprimesanfrancisco.com
dk-tnc.com
sodangwang.com
abrat-ed.com
dusubiqiqijem.xyz
getsup.online
homeneto.com
shose8.com
tronlane.com
nidowicosasod.xyz
independienteatleticclub.com
pca-winschool.com
realbadnastystories.site
bluevioletfloral.com
simplifiedpeacepodcast.com
abcfreediving.com
theyardbunny.com
holoique.com
ibkr1325.com
tjnfioou.xyz
bumbleapi.com
universityofnorthdakota.com
kisoriyan.com
scienceiva.com
permislbzd.store
mysoiree-lyon.com
philippinenow.com
officialjoyslots.com
casualdatingsites.online
delia-flores.com
eroerofuck.com
myesu.net
tryhard-production.com
3beadsbytj.com
congtycoessentials.net
3doutfits.com
spencersigmon.xyz
mewydyrqd.xyz
manigua.store
teescuchooffee.com
websitetudong.com
shiere.com
rummypepper.com
universeinteriors.com
royaledutyfree.com
evolutionarycurandera.com
seulookexpress.com
seajetguard.com
monikamosur.com
columbiaathleticboosters.com
sem4seo.com
businesstechblueprint.com
kreativemarketingconcepts.com
maisons-france-confort-mp.com
lixinjishaiwang.com
mybrabdmall.com
mrdreamhouse.com
graysrbm.online
theboathub.com
50039219.com
rincondelvinologo.com
coreatechnologyonline.com
artuta.com
teaneckvegan.com
iselotech.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2680-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2680-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2920-28-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1484 set thread context of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 2680 set thread context of 1216 2680 PO#A91641-MSKU9953077.exe 21 PID 2920 set thread context of 1216 2920 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#A91641-MSKU9953077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1484 PO#A91641-MSKU9953077.exe 1484 PO#A91641-MSKU9953077.exe 1484 PO#A91641-MSKU9953077.exe 1484 PO#A91641-MSKU9953077.exe 1484 PO#A91641-MSKU9953077.exe 1484 PO#A91641-MSKU9953077.exe 2680 PO#A91641-MSKU9953077.exe 2680 PO#A91641-MSKU9953077.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2680 PO#A91641-MSKU9953077.exe 2680 PO#A91641-MSKU9953077.exe 2680 PO#A91641-MSKU9953077.exe 2920 rundll32.exe 2920 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1484 PO#A91641-MSKU9953077.exe Token: SeDebugPrivilege 2680 PO#A91641-MSKU9953077.exe Token: SeDebugPrivilege 2920 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1484 PO#A91641-MSKU9953077.exe 1484 PO#A91641-MSKU9953077.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2772 1484 PO#A91641-MSKU9953077.exe 31 PID 1484 wrote to memory of 2772 1484 PO#A91641-MSKU9953077.exe 31 PID 1484 wrote to memory of 2772 1484 PO#A91641-MSKU9953077.exe 31 PID 1484 wrote to memory of 2772 1484 PO#A91641-MSKU9953077.exe 31 PID 1484 wrote to memory of 2732 1484 PO#A91641-MSKU9953077.exe 32 PID 1484 wrote to memory of 2732 1484 PO#A91641-MSKU9953077.exe 32 PID 1484 wrote to memory of 2732 1484 PO#A91641-MSKU9953077.exe 32 PID 1484 wrote to memory of 2732 1484 PO#A91641-MSKU9953077.exe 32 PID 1484 wrote to memory of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 1484 wrote to memory of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 1484 wrote to memory of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 1484 wrote to memory of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 1484 wrote to memory of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 1484 wrote to memory of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 1484 wrote to memory of 2680 1484 PO#A91641-MSKU9953077.exe 33 PID 1216 wrote to memory of 2920 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2920 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2920 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2920 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2920 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2920 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2920 1216 Explorer.EXE 34 PID 2920 wrote to memory of 2740 2920 rundll32.exe 35 PID 2920 wrote to memory of 2740 2920 rundll32.exe 35 PID 2920 wrote to memory of 2740 2920 rundll32.exe 35 PID 2920 wrote to memory of 2740 2920 rundll32.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"3⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"3⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2740
-
-