Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
vz7lgfephbs.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
vz7lgfephbs.exe
Resource
win10-20240611-en
General
-
Target
vz7lgfephbs.exe
-
Size
454KB
-
MD5
78556723d290bbbeb1ed8c761861f8f8
-
SHA1
8eaad367886c44e90962bc5c23ecdb16761031f1
-
SHA256
1abe9c17071932ed40d00325752b433b244fd2410bb88d8fb2d194a2e5e3059e
-
SHA512
0f17a1cc369ffc92b5a82e50e42edcc2a10736c838ae4cb12a9eeb46009ef7b744e7c92e52bb79a39506918df58545454fce734bbbeb676e48ddef27e4ed35c5
-
SSDEEP
12288:39vAtRe9JF3Z7uSU2mgLb67ioQwL3eHjJS:3it4h9bQi8L2jJ
Malware Config
Extracted
formbook
4.1
support
acryingshame.info
aycicegiyapi.net
reserveyar.com
intiagri.com
brothersma.com
transparenzsiegel.net
waqa.ltd
montanafarmranches.com
victorysalesandmarketing.net
tintoy.net
checkfixtures.com
jdoeworld.com
acuvueonline.com
hhpphz.com
wszcjt.com
pettreats.pet
jbellamyhomes.com
ht61laju26h.biz
basilmoters.com
pollyannalabs.com
vagerr.com
businessharbinger.com
teknisetsipila.com
stock-76.com
waterlessturfca.net
sempativetasli.com
verifier-cuenta.com
fortrick.com
laxtolcy.com
improve.group
shhtzj.com
dumbosoho.com
bafangshui.com
gz-xgt.com
kurtgottwald.com
girlmakesporn.net
bagstolove.com
volveraempezar.com
livefoli.com
jayamahebalitour.com
latesthomedesign.info
canhonavita.com
mtor.agency
festnoise.com
economydallas.win
jackovski.com
blackmeezareno.com
apell4.com
hmlequine.com
amarketing2018.com
theunboxedcreative.com
amisdumaire-saintraphael.com
adelebooks.com
intrumpwetrust.online
irresistible-arrangements.com
lbhun.com
208man.com
bellagraceoriginals.com
sellingrockypointrealestate.com
wwwyl3300.com
eabatvjyf.download
sunyi.group
nmsimplecremation.com
300i6ue.com
ell.top
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/1420-2-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1420-6-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1420-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2100 set thread context of 1420 2100 vz7lgfephbs.exe 32 PID 1420 set thread context of 1200 1420 vz7lgfephbs.exe 21 PID 1420 set thread context of 1200 1420 vz7lgfephbs.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vz7lgfephbs.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1420 vz7lgfephbs.exe 1420 vz7lgfephbs.exe 1420 vz7lgfephbs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2100 vz7lgfephbs.exe 1420 vz7lgfephbs.exe 1420 vz7lgfephbs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1420 vz7lgfephbs.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1420 2100 vz7lgfephbs.exe 32 PID 2100 wrote to memory of 1420 2100 vz7lgfephbs.exe 32 PID 2100 wrote to memory of 1420 2100 vz7lgfephbs.exe 32 PID 2100 wrote to memory of 1420 2100 vz7lgfephbs.exe 32 PID 2100 wrote to memory of 1420 2100 vz7lgfephbs.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-