Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 14:21
Static task
static1
Behavioral task
behavioral1
Sample
FEDEX TRN 771893954554.exe
Resource
win7-20240903-en
General
-
Target
FEDEX TRN 771893954554.exe
-
Size
2.2MB
-
MD5
22b365e10dd635468212251994b194bf
-
SHA1
069d6d2395ec518d0156b6d02519d3b8e896e5b5
-
SHA256
7f9b8fcc527d02e66b49d76ff52297d69dbf237a8dd4342fdf3f49a2189c67d0
-
SHA512
fbb27e9c38a6f351edd756b00227c42b98bf08c89c1c85e3b74462a381b61e4347972f373327f540b5744ef661ed0c1b3072b188616d5a5950478720bddefb1b
-
SSDEEP
24576:iB26eZ4fTPkhZ2PAG0pMn6+YZ8IOxSD68Q81Zr6kNefAd/YK2HzQX9Kub+YSgrBK:Zhhj+EbjDE81R6iY7O
Malware Config
Extracted
formbook
4.1
oa09
grit.careers
kingthaivegas.com
onwingirisleri.net
radio-jesus.com
forestfairiesnft.com
healthyintimatelifestyle.africa
karamoghanasti.africa
gqujtf.com
chaindenmark.com
netzerosemitechnologies.co.uk
kakekpecah1000.com
fiddler-foaled.click
adventurepsychologist.com
miletong.net
discounttirestoresinc.com
goldmanmediaent.com
entsorgunglangnau.ch
brezop.xyz
24-02-2022.site
artificialgrassminneapolis.com
animalbehaviourist.uk
jawara377.info
fatherhoodafter40.com
coelder.com
dridontknowitall.com
connectedwfportal.com
krockcitydegreez.africa
astraledo.ru
aneariztegui.com
boosthacknet.com
fieok.top
www337cf.com
burgerbadass.online
bumvesti.com
coachwennberg.com
cctvmarketplace.africa
usa-mill.net
753olive.com
innaija.com
antswroughtiron.com
mbltellecoms.africa
cqdxbs.com
findmy-mapsconect.com
hscp8.com
13801565016.com
8264x.com
orowa.co.uk
swadeshforever.net
distribuidorapositano.online
globalexpress.africa
disneycotinoresale.com
familiaecotono.com
cxrh-official.com
flexocomponents.com
efefzippy.buzz
generalhospitalaulue.africa
elements.wine
excursionscapetown.com
ceairaharris.net
qqhr.club
6n883.com
coinbook.pro
a-avdeeva.com
dawncat.net
bestboss.shop
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2788-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2656-22-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vmfdofz = "\"C:\\Users\\Admin\\AppData\\Roaming\\Vkqwztiilf\\Vmfdofz.exe\"" FEDEX TRN 771893954554.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1292 set thread context of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 2788 set thread context of 1208 2788 FEDEX TRN 771893954554.exe 21 PID 2656 set thread context of 1208 2656 wlanext.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FEDEX TRN 771893954554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2376 powershell.exe 1292 FEDEX TRN 771893954554.exe 1292 FEDEX TRN 771893954554.exe 2788 FEDEX TRN 771893954554.exe 2788 FEDEX TRN 771893954554.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe 2656 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2788 FEDEX TRN 771893954554.exe 2788 FEDEX TRN 771893954554.exe 2788 FEDEX TRN 771893954554.exe 2656 wlanext.exe 2656 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 1292 FEDEX TRN 771893954554.exe Token: SeDebugPrivilege 2788 FEDEX TRN 771893954554.exe Token: SeDebugPrivilege 2656 wlanext.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2376 1292 FEDEX TRN 771893954554.exe 30 PID 1292 wrote to memory of 2376 1292 FEDEX TRN 771893954554.exe 30 PID 1292 wrote to memory of 2376 1292 FEDEX TRN 771893954554.exe 30 PID 1292 wrote to memory of 2376 1292 FEDEX TRN 771893954554.exe 30 PID 1292 wrote to memory of 2848 1292 FEDEX TRN 771893954554.exe 33 PID 1292 wrote to memory of 2848 1292 FEDEX TRN 771893954554.exe 33 PID 1292 wrote to memory of 2848 1292 FEDEX TRN 771893954554.exe 33 PID 1292 wrote to memory of 2848 1292 FEDEX TRN 771893954554.exe 33 PID 1292 wrote to memory of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 1292 wrote to memory of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 1292 wrote to memory of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 1292 wrote to memory of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 1292 wrote to memory of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 1292 wrote to memory of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 1292 wrote to memory of 2788 1292 FEDEX TRN 771893954554.exe 34 PID 1208 wrote to memory of 2656 1208 Explorer.EXE 35 PID 1208 wrote to memory of 2656 1208 Explorer.EXE 35 PID 1208 wrote to memory of 2656 1208 Explorer.EXE 35 PID 1208 wrote to memory of 2656 1208 Explorer.EXE 35 PID 2656 wrote to memory of 2672 2656 wlanext.exe 36 PID 2656 wrote to memory of 2672 2656 wlanext.exe 36 PID 2656 wrote to memory of 2672 2656 wlanext.exe 36 PID 2656 wrote to memory of 2672 2656 wlanext.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\FEDEX TRN 771893954554.exe"C:\Users\Admin\AppData\Local\Temp\FEDEX TRN 771893954554.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\FEDEX TRN 771893954554.exe"C:\Users\Admin\AppData\Local\Temp\FEDEX TRN 771893954554.exe"3⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\FEDEX TRN 771893954554.exe"C:\Users\Admin\AppData\Local\Temp\FEDEX TRN 771893954554.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FEDEX TRN 771893954554.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2672
-
-