Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
Oversea Sales Purchases..exe
Resource
win7-20240903-en
General
-
Target
Oversea Sales Purchases..exe
-
Size
527KB
-
MD5
1fefd4454f760fd94bcec743b13e6c6b
-
SHA1
4caa024e1494738b1951f58ff382b3c1479be067
-
SHA256
e98fbae65e642aef0ad45e52f3154a698ad6274c13e1d13e444b40b4882727bf
-
SHA512
e68e6e2e973e0d323b6801f4ad380adaf655a09ce99deaf227fcb97a371929f832a5246e25ede75d076f756797e069a0ebc039ba1e5e079c8cda1abb5fa958a4
-
SSDEEP
12288:YPPKGTI6yju065y4ypCAervisF/gvz3d21BKoiqtD001SyZvXjQbaD6:4PxI1juT5yNpC9im/Ez3dsBd/C0
Malware Config
Extracted
formbook
4.1
a34b
overse.biz
thecarths.com
bouw-service.net
xn--9kq93eezbv99d.com
rf-deer.com
cantas.site
prestizh-pol1.online
fxptjs.com
diarypedia.com
delawareescaperoom.com
ios-buscarbr.com
ahhcarina.com
queernurseconsultants.com
xycp6288.com
swamplilys.com
purposefulliving.site
rockverse.biz
assistantsincrypto.com
avantes.club
themuseumwithoutwalls.com
findanybuilder.com
panoramapet.info
rxarjuur.net
projecthomestudios.net
lcphotographyut.com
905harding.com
phantasticcreationz.com
mvd1f9jo.xyz
biecb.com
crllxjc.rest
hottesttoysforkids2021.xyz
bagufin.online
sgud.xyz
qm8917.com
kdbsesn.xyz
yuxingfurniture.com
sewafotocopybogor.com
thecaravantechnician.com
cayyoluveteriner.com
myticketsforgood.com
selaohu.xyz
tropicalvanuatu.com
quanzhoufengchaoban.com
hbrpny-leichhardt.online
walmartbook.com
cae657.xyz
4nhokitablog.com
refinedrecruitmentco.com
fightcampmedia.com
waterdns.com
weightlosspills.review
sunnahbeauty.com
murakami-eth.com
painaid.net
ohioenergyoptions.com
leuswim.com
state48doodlesandyorkies.com
visionintegral.site
bestpurchasesnow.com
metaversebreakfast.com
hmebuild.com
rayssecretsystem.com
merakaihostel.com
xkangas.com
pzw001.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2884-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2884-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1776-22-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2240 set thread context of 2884 2240 Oversea Sales Purchases..exe 31 PID 2884 set thread context of 1200 2884 Oversea Sales Purchases..exe 21 PID 1776 set thread context of 1200 1776 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oversea Sales Purchases..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2884 Oversea Sales Purchases..exe 2884 Oversea Sales Purchases..exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe 1776 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2884 Oversea Sales Purchases..exe 2884 Oversea Sales Purchases..exe 2884 Oversea Sales Purchases..exe 1776 cmstp.exe 1776 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2884 Oversea Sales Purchases..exe Token: SeDebugPrivilege 1776 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2884 2240 Oversea Sales Purchases..exe 31 PID 2240 wrote to memory of 2884 2240 Oversea Sales Purchases..exe 31 PID 2240 wrote to memory of 2884 2240 Oversea Sales Purchases..exe 31 PID 2240 wrote to memory of 2884 2240 Oversea Sales Purchases..exe 31 PID 2240 wrote to memory of 2884 2240 Oversea Sales Purchases..exe 31 PID 2240 wrote to memory of 2884 2240 Oversea Sales Purchases..exe 31 PID 2240 wrote to memory of 2884 2240 Oversea Sales Purchases..exe 31 PID 1200 wrote to memory of 1776 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1776 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1776 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1776 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1776 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1776 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1776 1200 Explorer.EXE 57 PID 1776 wrote to memory of 2916 1776 cmstp.exe 58 PID 1776 wrote to memory of 2916 1776 cmstp.exe 58 PID 1776 wrote to memory of 2916 1776 cmstp.exe 58 PID 1776 wrote to memory of 2916 1776 cmstp.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1608
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1656
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2256
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2272
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2484
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1840
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1696
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:820
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:980
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2912
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2968
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1108
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2016
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1788
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2224
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2324
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1832
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2424
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2220
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2428
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2112
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2664
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1368
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:468
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1632
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
-