Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
PROJECT FEJ-1601.exe
Resource
win7-20240708-en
General
-
Target
PROJECT FEJ-1601.exe
-
Size
394KB
-
MD5
212f0a0a7237ab09c82f6153361ac1b0
-
SHA1
1b84fff6041a1700f34c80a6e737e8e8c80d5770
-
SHA256
40bec545f9b01c4438a75cb03d902cc70c65ce8ecf90ecb1fb88aeb00b2c92cc
-
SHA512
232d6573a5801af940f13f97adae7f6d7a7cd38a3b61b190437f666387508db5668df77db980de3b911e2dab806587f9a486ccab5887a50f27efabb538ade348
-
SSDEEP
12288:U1zgVlrWHFZED24Ug/Q50b4Qhw+hjcnUgtICxs3IEeC:U1zgVlrWHwi4+5Y4WzhjcnUgXpE
Malware Config
Extracted
formbook
4.1
ykj
polovnitelefoni.net
cateless.com
newbeginnings.club
quanghoagroup.com
pcbet0.com
normal.computer
yoinkyoink.com
lahorekabob.com
charnal-voices.com
hotsleepspot.com
thekashmirfabrics.com
upholsteryormondbeach.com
caramel-lefilm.com
pkitales.com
truancyclub.com
susanmathason.com
sweetlimenail.com
vaaudiotechnic.site
edem-agency.com
rakkonoteineinakurashi.com
strukkbizworldonline.com
viladas.com
kevinhoffmanart.com
auroyaumedecire.com
blueskyserv.com
spaatoola.com
estoicoboliviano.com
parkinlotpimpin.com
citymantis.com
lifefrugal.com
kew-uxdesign.com
higstyle.com
hutsonfamilyinsurance.com
innovativlabor.com
organicmobiletanning.com
parmansercon.com
marktplaatsaccount.info
bldh666.com
townelegal.com
babyscornerstore.com
xinanc.com
mycampussigns.com
bakldx.com
ylwdog.com
emagrecercomhiit.com
signefi.com
testproconsulting.com
parkerfeedco.com
frostox.com
filmtencent.club
bambooglobalstore.com
islamoradakeyflorist.com
haohanvolam.com
velonesveleza.com
infomezzo.com
rorotanitim.com
360steve.com
smarteryou6d7.club
gpstecnologiamotriz.com
wvmcoop.com
sectarism-multiplied.info
kqnouwj.com
maddfella.com
jiangsufeiyue.com
farrsideofleadership.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2560-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2560-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2560-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 300 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2444 set thread context of 2560 2444 PROJECT FEJ-1601.exe 30 PID 2560 set thread context of 1192 2560 PROJECT FEJ-1601.exe 21 PID 2560 set thread context of 1192 2560 PROJECT FEJ-1601.exe 21 PID 1676 set thread context of 1192 1676 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROJECT FEJ-1601.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2560 PROJECT FEJ-1601.exe 2560 PROJECT FEJ-1601.exe 2560 PROJECT FEJ-1601.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe 1676 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2560 PROJECT FEJ-1601.exe 2560 PROJECT FEJ-1601.exe 2560 PROJECT FEJ-1601.exe 2560 PROJECT FEJ-1601.exe 1676 msdt.exe 1676 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2560 PROJECT FEJ-1601.exe Token: SeDebugPrivilege 1676 msdt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2560 2444 PROJECT FEJ-1601.exe 30 PID 2444 wrote to memory of 2560 2444 PROJECT FEJ-1601.exe 30 PID 2444 wrote to memory of 2560 2444 PROJECT FEJ-1601.exe 30 PID 2444 wrote to memory of 2560 2444 PROJECT FEJ-1601.exe 30 PID 2444 wrote to memory of 2560 2444 PROJECT FEJ-1601.exe 30 PID 2444 wrote to memory of 2560 2444 PROJECT FEJ-1601.exe 30 PID 2444 wrote to memory of 2560 2444 PROJECT FEJ-1601.exe 30 PID 1192 wrote to memory of 1676 1192 Explorer.EXE 31 PID 1192 wrote to memory of 1676 1192 Explorer.EXE 31 PID 1192 wrote to memory of 1676 1192 Explorer.EXE 31 PID 1192 wrote to memory of 1676 1192 Explorer.EXE 31 PID 1676 wrote to memory of 300 1676 msdt.exe 32 PID 1676 wrote to memory of 300 1676 msdt.exe 32 PID 1676 wrote to memory of 300 1676 msdt.exe 32 PID 1676 wrote to memory of 300 1676 msdt.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:300
-
-