Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
client order.exe
Resource
win7-20240729-en
General
-
Target
client order.exe
-
Size
688KB
-
MD5
f9ab9af186e3f93e2151f5a579a87ed5
-
SHA1
0295a08decc7447e11d0a72aa139fe5564fedcaf
-
SHA256
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639
-
SHA512
eeaaca6d9ff2be7f8ad961ac36b67afa651e9ab1ddea5679276f7383ebf72ee8b799cf1300199d49c6da01b023a786ed7685d57757a8d9e25fea01c759a50dbb
-
SSDEEP
12288:yrON+Ri3AgFdAirPuV7lXmkEFRtPWENotTyOxsuY+VE6/D+/HBzJ96Q:6Q3AggbmVFRt+uotTr8YLozqQ
Malware Config
Extracted
formbook
4.1
q06e
iibutogel88.life
atumainitx.net
axto1xb.top
iberalparti.xyz
etfury.shop
ainter-job-14480.bond
rhyd82593.vip
yexoiup.xyz
ityreel.page
usiness-ddljxgk.top
eifeigou.top
asl321.dev
eativ.cloud
ollywoodbets.fan
azekage.shop
ojarski.online
ardtaste.net
ltair-bots.online
atncs.top
k8y.info
bookauto.site
reencollectiongrup.online
3001.vip
alancednourish.shop
aliente.furniture
elationship-coach-50004.bond
doglesa.homes
afatogela.live
uu98.top
eal-estate-55232.bond
dtrear.net
588535.vip
b53ojq9.top
efurbico.online
ersawgero.online
mica.store
andor.site
arehouse-inventory-59535.bond
ajaslot88.store
lariphi.app
bookbusiness.shop
mvip7.xyz
foye8.buzz
g8.today
lockchain-life.forum
kyboost.digital
wyza32084.vip
wander.shop
dyd.top
icitaenlinea.digital
ockmybrand.shop
extlan.net
ouches-sofas-93874.bond
hinz.net
sphome.pro
racimp.bond
orus.wiki
all-center-88424.bond
tjia.info
iqnli.top
slpo.link
192222-com00.top
fricanti.online
unce.top
tacr.click
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4272-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4272-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1808-21-0x0000000000D50000-0x0000000000D7E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
client order.execlient order.execmstp.exedescription pid process target process PID 544 set thread context of 4272 544 client order.exe client order.exe PID 4272 set thread context of 3496 4272 client order.exe Explorer.EXE PID 1808 set thread context of 3496 1808 cmstp.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
client order.execmstp.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
client order.execlient order.execmstp.exepid process 544 client order.exe 544 client order.exe 544 client order.exe 544 client order.exe 544 client order.exe 544 client order.exe 4272 client order.exe 4272 client order.exe 4272 client order.exe 4272 client order.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
client order.execmstp.exepid process 4272 client order.exe 4272 client order.exe 4272 client order.exe 1808 cmstp.exe 1808 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
client order.execlient order.execmstp.exedescription pid process Token: SeDebugPrivilege 544 client order.exe Token: SeDebugPrivilege 4272 client order.exe Token: SeDebugPrivilege 1808 cmstp.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3496 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
client order.exeExplorer.EXEcmstp.exedescription pid process target process PID 544 wrote to memory of 4272 544 client order.exe client order.exe PID 544 wrote to memory of 4272 544 client order.exe client order.exe PID 544 wrote to memory of 4272 544 client order.exe client order.exe PID 544 wrote to memory of 4272 544 client order.exe client order.exe PID 544 wrote to memory of 4272 544 client order.exe client order.exe PID 544 wrote to memory of 4272 544 client order.exe client order.exe PID 3496 wrote to memory of 1808 3496 Explorer.EXE cmstp.exe PID 3496 wrote to memory of 1808 3496 Explorer.EXE cmstp.exe PID 3496 wrote to memory of 1808 3496 Explorer.EXE cmstp.exe PID 1808 wrote to memory of 1388 1808 cmstp.exe cmd.exe PID 1808 wrote to memory of 1388 1808 cmstp.exe cmd.exe PID 1808 wrote to memory of 1388 1808 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\client order.exe"C:\Users\Admin\AppData\Local\Temp\client order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\client order.exe"C:\Users\Admin\AppData\Local\Temp\client order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\client order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-