Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
PO-2021-FV6ppD.exe
Resource
win7-20240708-en
General
-
Target
PO-2021-FV6ppD.exe
-
Size
1020KB
-
MD5
b76684163bc9667e4907b4034a0763c1
-
SHA1
4bda936ca3dee495b15aee5378a3dc87abd7cdef
-
SHA256
957c5b5a6f0af47354f9ed2d09522fc671b8c0af06e3f3a5b6354e111b2c8129
-
SHA512
10182cd2737aa6f7a1e8716659b89a96ee3bea78c0144cd19d491ac444639ddb13f6dc543ac7a5744b075cc3c02ffab4b0b088712c376fc3700c27aeedab435f
-
SSDEEP
12288:dhm2ptsj6jRPLjRPqjBjjyjBjBjBjBjLj6Pf71xLtDaGgr2KbA16sCCwpTx9EEWm:oPHLtbx16Smx9Ey75
Malware Config
Extracted
formbook
4.1
llc
mombosslounge.com
ladybnaturalhairproductsllc.com
fincazalduendo.com
asrahealth.net
lanbrandmanual.com
hirano-gyosei.com
storywoth.com
sailde.com
jagurutech.com
greenfuturemarket.com
jaguar-marketing.com
mytherapies.net
occidentaldissent.net
onlinemarketingbusinessbd.com
blackleadership.info
leosquad.store
becauseiknewyouweremine.com
athertonsewer.com
springbiologicaldentistry.net
rockthefunnels.com
ifp-events.com
costaricajusta.com
actuelburo.xyz
moreflor.com
priceforclanton.com
advance.productions
ingagemktg.com
bakldx.com
foxconmasonry.com
rubinpool.net
saxonsproperties.com
models-siterips.com
bureauosaka.com
covidvaxhelp.com
cutelittlethingz.com
khambiworkwear.com
hopchup.com
connectpalcofirst.com
wonderlandsparadise.com
mysoulcure.com
bod-canada.com
shopmixologyapp.com
obscuritee.club
campbox.net
apartments-makarska.net
backyardsuperstar.com
ibtwin.com
biblesauthor.com
decoroom.online
vu7ag.info
gsspremium.xyz
galagonwagon.com
szmuwang.com
bakerscornerpizza.com
lookmanocode.com
xn--ol-xia.com
fitnessben.com
meganschoonbrood.com
fayefenelus.com
megenagnarestaurant.com
ayanb.win
raphacall.com
premium-hemp-store.com
dunamicreative.com
roofingchimeyspecialist.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1740-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1740-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2172 set thread context of 1740 2172 PO-2021-FV6ppD.exe 31 PID 1740 set thread context of 1192 1740 PO-2021-FV6ppD.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 740 2988 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO-2021-FV6ppD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 PO-2021-FV6ppD.exe 1740 PO-2021-FV6ppD.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1740 PO-2021-FV6ppD.exe 1740 PO-2021-FV6ppD.exe 1740 PO-2021-FV6ppD.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1740 PO-2021-FV6ppD.exe Token: SeShutdownPrivilege 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1740 2172 PO-2021-FV6ppD.exe 31 PID 2172 wrote to memory of 1740 2172 PO-2021-FV6ppD.exe 31 PID 2172 wrote to memory of 1740 2172 PO-2021-FV6ppD.exe 31 PID 2172 wrote to memory of 1740 2172 PO-2021-FV6ppD.exe 31 PID 2172 wrote to memory of 1740 2172 PO-2021-FV6ppD.exe 31 PID 2172 wrote to memory of 1740 2172 PO-2021-FV6ppD.exe 31 PID 2172 wrote to memory of 1740 2172 PO-2021-FV6ppD.exe 31 PID 1192 wrote to memory of 2988 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2988 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2988 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2988 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2988 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2988 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2988 1192 Explorer.EXE 32 PID 2988 wrote to memory of 740 2988 msiexec.exe 33 PID 2988 wrote to memory of 740 2988 msiexec.exe 33 PID 2988 wrote to memory of 740 2988 msiexec.exe 33 PID 2988 wrote to memory of 740 2988 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2683⤵
- Program crash
PID:740
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2668