Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
datasheet.exe
Resource
win7-20240708-en
General
-
Target
datasheet.exe
-
Size
892KB
-
MD5
156a8f3ff2daa772e183f33d03542088
-
SHA1
d5c5d9adc26f34f357bbbc04b76db5589154c096
-
SHA256
1517b72d950951e2a53e5881d9f72ef224128454d1bf4ad28afbbee341787e9c
-
SHA512
bf19dacebe4ca845683f2a0e63e03df6d93619ab8eecc7971b4554c48bbd03e0f4c796c635268261110be4d718dc8163a11c208e9d27bffacd29a8d8bf801f25
-
SSDEEP
12288:xLfmbbfGD5BroDcsIE++hSpk6L1S3Yp+vpVhd5FhM1wVTMsMz4AJ3sPerFfBL2qJ:xLfmbbfirrts4+ApkmAYp+vdFRtT8
Malware Config
Extracted
formbook
4.1
gbl
dx268.com
textbot4you.com
critictable.com
fsclub.info
order-review.com
tkgenergy.com
contavip.info
fashionests.com
sieromart.com
miamimobiletesting.com
oxforhabits.com
yugoslavilk.online
inieenterprises.com
bythebucketfranchise.com
parcelified.com
signalcyclers.com
starryeyedproject.com
proteacherstore.com
horos.tech
bovadaracebook.sucks
goldankauf-innsbruck.net
thecreepercartel.com
sreed-author.com
spezzasanitizationservice.com
menz-world.com
naigves.com
cottonlandboutique.com
c-oilyprescriptions.com
deepsnowart.com
pgcpsmdc.com
mysecretwhore.com
khiladitheplayer.net
ctpolicetransparency.com
brooks-boutique.com
emotiveexchange.com
stavkinasport1xbet.com
bodysense.online
sosostenible.com
dilinbang.net
mahakayatm.com
iwebsrvc.info
bseisu.com
elvinejackets.com
gteless.net
copccam.icu
brokercrypto.com
rms-africa.com
itsn-u.com
projectxecute.com
earndollarsinaflash.com
hookah-lounge.online
thcgoldoil.com
bikesbeardsbbq.com
williamzhao.design
hackersdealers.com
bobbybonesforpresident.com
ohmosa.com
methodactingstudio.com
wrfyqa.com
newcovenantcc.com
burritosfordogs.com
heidisophiabobia.com
xqy193.com
yaygroups.com
manimeenaja.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1684-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1684-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1684-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2096-26-0x00000000000C0000-0x00000000000EE000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2076 set thread context of 1684 2076 datasheet.exe 30 PID 1684 set thread context of 1204 1684 datasheet.exe 21 PID 1684 set thread context of 1204 1684 datasheet.exe 21 PID 2096 set thread context of 1204 2096 raserver.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datasheet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3551809350-4263495960-1443967649-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1684 datasheet.exe 1684 datasheet.exe 1684 datasheet.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1684 datasheet.exe 1684 datasheet.exe 1684 datasheet.exe 1684 datasheet.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe 2096 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 datasheet.exe Token: SeDebugPrivilege 2096 raserver.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1684 2076 datasheet.exe 30 PID 2076 wrote to memory of 1684 2076 datasheet.exe 30 PID 2076 wrote to memory of 1684 2076 datasheet.exe 30 PID 2076 wrote to memory of 1684 2076 datasheet.exe 30 PID 2076 wrote to memory of 1684 2076 datasheet.exe 30 PID 2076 wrote to memory of 1684 2076 datasheet.exe 30 PID 2076 wrote to memory of 1684 2076 datasheet.exe 30 PID 1204 wrote to memory of 2096 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2096 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2096 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2096 1204 Explorer.EXE 31 PID 2096 wrote to memory of 860 2096 raserver.exe 32 PID 2096 wrote to memory of 860 2096 raserver.exe 32 PID 2096 wrote to memory of 860 2096 raserver.exe 32 PID 2096 wrote to memory of 860 2096 raserver.exe 32 PID 2096 wrote to memory of 860 2096 raserver.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\datasheet.exe"C:\Users\Admin\AppData\Local\Temp\datasheet.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\datasheet.exe"C:\Users\Admin\AppData\Local\Temp\datasheet.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:860
-
-