Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe
Resource
win7-20240903-en
General
-
Target
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe
-
Size
822KB
-
MD5
f1217c3aad742f6f0aed2d6cae0feae6
-
SHA1
ec8c8d19b72ce379bba42d52edb0639c2564ee2c
-
SHA256
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182
-
SHA512
996b86f071a023e4f6ec6f0a0eee9d375a0fe36550615647ccf411dc1bbb4a715df4a53ced2f49d61b4ec4196a16b0f3977ea7bb18d795145b774be5a73fb49d
-
SSDEEP
12288:cbXj9L5sl1ApYy42fxWfWgYv7im/Qw9ELyX56CqFNpgNefKitTra:kL5sl1ApXhfQfivGAQDu56CqF3gNeCU
Malware Config
Extracted
formbook
4.1
btrd
toulouse.gold
launchyouglobal.com
margarita-services.com
dasnail.club
casa-hilo.com
hardscapesofflorida.com
thepositivitypulse.com
kkmyanev.cfd
love6ace22.top
castorcruise.com
chch6.com
h59f07jy.cfd
saatvikteerthyatra.com
fxsecuretrading-option.com
mostbet-k1o.click
36-m.beauty
ko-or-a-news.com
eurekatextile.com
gynlkj.com
deepsouthcraftsman.com
bougiebossbabe.com
202402.xyz
thecareskin.com
zimmerli.online
bathroomconnectsupreme.com
opmk.monster
docemimocasamentos.com
mywayinist.com
healthyters.com
mozartchamberorchestra.sydney
wewillrock.club
education2jobs.com
everlastdisposal.com
valentinascrochet.com
stewartvaluation.net
blackphoenix01.xyz
omnikart.shop
jejeesclothing.com
allurepet.site
futureofaustin.com
sillylittlestory.com
inthewoodsdesigns.com
freshtraining.store
illuminati4me.com
jewishlakecounty.com
devadecoration.com
nashexshop.com
martline.website
affirmationtotebags.com
golifestyles.com
telegood.info
trygenesisx.com
bestwhitetee.com
delicatemayhem.com
redyardcom.com
solarcyborg.com
emotieloos.com
fanatics-international.com
ballonsmagiques.com
projektincognito.com
fcno30.com
horizonoutdoorservices.com
couturewrap.com
mbbwa4wp.cfd
lifeofthobes.uk
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2384-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2384-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2384-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeAddInProcess32.exedescription pid Process procid_target PID 2280 set thread context of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 2384 set thread context of 1212 2384 AddInProcess32.exe 21 PID 2384 set thread context of 1212 2384 AddInProcess32.exe 21 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2556 3004 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exemsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeAddInProcess32.exepid Process 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 2384 AddInProcess32.exe 2384 AddInProcess32.exe 2384 AddInProcess32.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
AddInProcess32.exepid Process 2384 AddInProcess32.exe 2384 AddInProcess32.exe 2384 AddInProcess32.exe 2384 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeAddInProcess32.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe Token: SeDebugPrivilege 2384 AddInProcess32.exe Token: SeShutdownPrivilege 1212 Explorer.EXE Token: SeShutdownPrivilege 1212 Explorer.EXE Token: SeShutdownPrivilege 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeExplorer.EXEmsiexec.exedescription pid Process procid_target PID 2280 wrote to memory of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 2280 wrote to memory of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 2280 wrote to memory of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 2280 wrote to memory of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 2280 wrote to memory of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 2280 wrote to memory of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 2280 wrote to memory of 2384 2280 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 30 PID 1212 wrote to memory of 3004 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3004 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3004 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3004 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3004 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3004 1212 Explorer.EXE 31 PID 1212 wrote to memory of 3004 1212 Explorer.EXE 31 PID 3004 wrote to memory of 2556 3004 msiexec.exe 32 PID 3004 wrote to memory of 2556 3004 msiexec.exe 32 PID 3004 wrote to memory of 2556 3004 msiexec.exe 32 PID 3004 wrote to memory of 2556 3004 msiexec.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe"C:\Users\Admin\AppData\Local\Temp\dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 2683⤵
- Program crash
PID:2556
-
-