Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
PO-2021-FV6ppD.exe
Resource
win7-20240708-en
General
-
Target
PO-2021-FV6ppD.exe
-
Size
1020KB
-
MD5
b76684163bc9667e4907b4034a0763c1
-
SHA1
4bda936ca3dee495b15aee5378a3dc87abd7cdef
-
SHA256
957c5b5a6f0af47354f9ed2d09522fc671b8c0af06e3f3a5b6354e111b2c8129
-
SHA512
10182cd2737aa6f7a1e8716659b89a96ee3bea78c0144cd19d491ac444639ddb13f6dc543ac7a5744b075cc3c02ffab4b0b088712c376fc3700c27aeedab435f
-
SSDEEP
12288:dhm2ptsj6jRPLjRPqjBjjyjBjBjBjBjLj6Pf71xLtDaGgr2KbA16sCCwpTx9EEWm:oPHLtbx16Smx9Ey75
Malware Config
Extracted
formbook
4.1
llc
mombosslounge.com
ladybnaturalhairproductsllc.com
fincazalduendo.com
asrahealth.net
lanbrandmanual.com
hirano-gyosei.com
storywoth.com
sailde.com
jagurutech.com
greenfuturemarket.com
jaguar-marketing.com
mytherapies.net
occidentaldissent.net
onlinemarketingbusinessbd.com
blackleadership.info
leosquad.store
becauseiknewyouweremine.com
athertonsewer.com
springbiologicaldentistry.net
rockthefunnels.com
ifp-events.com
costaricajusta.com
actuelburo.xyz
moreflor.com
priceforclanton.com
advance.productions
ingagemktg.com
bakldx.com
foxconmasonry.com
rubinpool.net
saxonsproperties.com
models-siterips.com
bureauosaka.com
covidvaxhelp.com
cutelittlethingz.com
khambiworkwear.com
hopchup.com
connectpalcofirst.com
wonderlandsparadise.com
mysoulcure.com
bod-canada.com
shopmixologyapp.com
obscuritee.club
campbox.net
apartments-makarska.net
backyardsuperstar.com
ibtwin.com
biblesauthor.com
decoroom.online
vu7ag.info
gsspremium.xyz
galagonwagon.com
szmuwang.com
bakerscornerpizza.com
lookmanocode.com
xn--ol-xia.com
fitnessben.com
meganschoonbrood.com
fayefenelus.com
megenagnarestaurant.com
ayanb.win
raphacall.com
premium-hemp-store.com
dunamicreative.com
roofingchimeyspecialist.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/336-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/336-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 636 set thread context of 336 636 PO-2021-FV6ppD.exe 103 PID 336 set thread context of 3472 336 PO-2021-FV6ppD.exe 56 PID 2732 set thread context of 3472 2732 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO-2021-FV6ppD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 636 PO-2021-FV6ppD.exe 636 PO-2021-FV6ppD.exe 336 PO-2021-FV6ppD.exe 336 PO-2021-FV6ppD.exe 336 PO-2021-FV6ppD.exe 336 PO-2021-FV6ppD.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe 2732 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 336 PO-2021-FV6ppD.exe 336 PO-2021-FV6ppD.exe 336 PO-2021-FV6ppD.exe 2732 cmmon32.exe 2732 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 636 PO-2021-FV6ppD.exe Token: SeDebugPrivilege 336 PO-2021-FV6ppD.exe Token: SeDebugPrivilege 2732 cmmon32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3472 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 636 wrote to memory of 1004 636 PO-2021-FV6ppD.exe 102 PID 636 wrote to memory of 1004 636 PO-2021-FV6ppD.exe 102 PID 636 wrote to memory of 1004 636 PO-2021-FV6ppD.exe 102 PID 636 wrote to memory of 336 636 PO-2021-FV6ppD.exe 103 PID 636 wrote to memory of 336 636 PO-2021-FV6ppD.exe 103 PID 636 wrote to memory of 336 636 PO-2021-FV6ppD.exe 103 PID 636 wrote to memory of 336 636 PO-2021-FV6ppD.exe 103 PID 636 wrote to memory of 336 636 PO-2021-FV6ppD.exe 103 PID 636 wrote to memory of 336 636 PO-2021-FV6ppD.exe 103 PID 3472 wrote to memory of 2732 3472 Explorer.EXE 104 PID 3472 wrote to memory of 2732 3472 Explorer.EXE 104 PID 3472 wrote to memory of 2732 3472 Explorer.EXE 104 PID 2732 wrote to memory of 1844 2732 cmmon32.exe 105 PID 2732 wrote to memory of 1844 2732 cmmon32.exe 105 PID 2732 wrote to memory of 1844 2732 cmmon32.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"3⤵PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO-2021-FV6ppD.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-