Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
Oversea Sales Purchases..exe
Resource
win7-20240903-en
General
-
Target
Oversea Sales Purchases..exe
-
Size
527KB
-
MD5
1fefd4454f760fd94bcec743b13e6c6b
-
SHA1
4caa024e1494738b1951f58ff382b3c1479be067
-
SHA256
e98fbae65e642aef0ad45e52f3154a698ad6274c13e1d13e444b40b4882727bf
-
SHA512
e68e6e2e973e0d323b6801f4ad380adaf655a09ce99deaf227fcb97a371929f832a5246e25ede75d076f756797e069a0ebc039ba1e5e079c8cda1abb5fa958a4
-
SSDEEP
12288:YPPKGTI6yju065y4ypCAervisF/gvz3d21BKoiqtD001SyZvXjQbaD6:4PxI1juT5yNpC9im/Ez3dsBd/C0
Malware Config
Extracted
formbook
4.1
a34b
overse.biz
thecarths.com
bouw-service.net
xn--9kq93eezbv99d.com
rf-deer.com
cantas.site
prestizh-pol1.online
fxptjs.com
diarypedia.com
delawareescaperoom.com
ios-buscarbr.com
ahhcarina.com
queernurseconsultants.com
xycp6288.com
swamplilys.com
purposefulliving.site
rockverse.biz
assistantsincrypto.com
avantes.club
themuseumwithoutwalls.com
findanybuilder.com
panoramapet.info
rxarjuur.net
projecthomestudios.net
lcphotographyut.com
905harding.com
phantasticcreationz.com
mvd1f9jo.xyz
biecb.com
crllxjc.rest
hottesttoysforkids2021.xyz
bagufin.online
sgud.xyz
qm8917.com
kdbsesn.xyz
yuxingfurniture.com
sewafotocopybogor.com
thecaravantechnician.com
cayyoluveteriner.com
myticketsforgood.com
selaohu.xyz
tropicalvanuatu.com
quanzhoufengchaoban.com
hbrpny-leichhardt.online
walmartbook.com
cae657.xyz
4nhokitablog.com
refinedrecruitmentco.com
fightcampmedia.com
waterdns.com
weightlosspills.review
sunnahbeauty.com
murakami-eth.com
painaid.net
ohioenergyoptions.com
leuswim.com
state48doodlesandyorkies.com
visionintegral.site
bestpurchasesnow.com
metaversebreakfast.com
hmebuild.com
rayssecretsystem.com
merakaihostel.com
xkangas.com
pzw001.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/5104-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5104-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2824-21-0x0000000000C00000-0x0000000000C2F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4052 set thread context of 5104 4052 Oversea Sales Purchases..exe 100 PID 5104 set thread context of 3524 5104 Oversea Sales Purchases..exe 56 PID 2824 set thread context of 3524 2824 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oversea Sales Purchases..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4052 Oversea Sales Purchases..exe 4052 Oversea Sales Purchases..exe 5104 Oversea Sales Purchases..exe 5104 Oversea Sales Purchases..exe 5104 Oversea Sales Purchases..exe 5104 Oversea Sales Purchases..exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe 2824 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 5104 Oversea Sales Purchases..exe 5104 Oversea Sales Purchases..exe 5104 Oversea Sales Purchases..exe 2824 cmmon32.exe 2824 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4052 Oversea Sales Purchases..exe Token: SeDebugPrivilege 5104 Oversea Sales Purchases..exe Token: SeDebugPrivilege 2824 cmmon32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4052 wrote to memory of 1120 4052 Oversea Sales Purchases..exe 99 PID 4052 wrote to memory of 1120 4052 Oversea Sales Purchases..exe 99 PID 4052 wrote to memory of 1120 4052 Oversea Sales Purchases..exe 99 PID 4052 wrote to memory of 5104 4052 Oversea Sales Purchases..exe 100 PID 4052 wrote to memory of 5104 4052 Oversea Sales Purchases..exe 100 PID 4052 wrote to memory of 5104 4052 Oversea Sales Purchases..exe 100 PID 4052 wrote to memory of 5104 4052 Oversea Sales Purchases..exe 100 PID 4052 wrote to memory of 5104 4052 Oversea Sales Purchases..exe 100 PID 4052 wrote to memory of 5104 4052 Oversea Sales Purchases..exe 100 PID 3524 wrote to memory of 2824 3524 Explorer.EXE 101 PID 3524 wrote to memory of 2824 3524 Explorer.EXE 101 PID 3524 wrote to memory of 2824 3524 Explorer.EXE 101 PID 2824 wrote to memory of 1752 2824 cmmon32.exe 102 PID 2824 wrote to memory of 1752 2824 cmmon32.exe 102 PID 2824 wrote to memory of 1752 2824 cmmon32.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-