Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
soa.exe
Resource
win7-20240903-en
General
-
Target
soa.exe
-
Size
451KB
-
MD5
db7035b451f169a670b56a3a023b18e8
-
SHA1
d586fb0dbdfb1a37cf8097c3f11f4db745e9faa9
-
SHA256
aeccef59002b851b685cf54307f906c06adb065b68c3eff112f4b0f1442d1349
-
SHA512
fc6f4c6321747aa92301f8ac3d01cae40ad5d51df1cf294e179bd866537de0f5cef7f1b17616efbc2194679b7d7eff8b807d9d1ef9dc12331c497cbb4f89d707
-
SSDEEP
6144:rr5h1r6lmPMk8X25ahxL4XUhaGFo69nwTge6qG5yjNeQFgv8dKgvW:rrH1GIUk83xLfHSTg5qGIjNeDCKg
Malware Config
Extracted
formbook
4.1
bg6
uvs57.info
perfectpointapparel.com
sportsthrem.com
debowerdesigns.com
wzjs99.com
chothuexenangxecauninhbinh.com
blackkeymanagement.com
verdesonline.com
hezehzxx0530.com
alientechcenterlondon.com
body-suit.com
pcfip.com
perocreations.com
mingary.life
goldengoddessglamour.com
reparmaxpro.com
xn--fiqv1al2p20d348d.com
yourhomehealthcarellc.net
weddingproper.com
felicityhorseclub.com
pizzazucca.com
ausu96.com
nathanaeltrahan.com
kenabet.com
madebykat.com
kymsusujinsha.com
zds9999.com
uscawm.com
radhakrishnajeweller.com
bigexchanger.com
iptv008008.com
fhgks.info
sunflowerenergy.net
ernestospaccesi.com
thecyclingvegan.com
vcyrl.info
oliviavaldes.com
xn--iphone-gw7i830b0nltm4k.com
capitalrealestateservices.com
loziship.com
cumulustitle.com
collin-orl.com
842cedar.info
aiico88.com
vivalabavaria.com
heroin.tech
xn--vs2b19v.com
vehiclenotes.com
theoldcaliforniashow.com
incubatorplatform.com
metabolism-news.com
fifatee.com
idea-procedure.tech
sanamastore.com
topguardehub.com
howest.rocks
vanchuyenhanghoagiare.net
middletowntowingservices.com
newsroompk.com
outlawshavingco.com
152manbet.com
tunisiennenue.com
cakeconstructionsupply.com
tictmaster.com
flekcht.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2712-10-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2712-14-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2712-18-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1984 set thread context of 2712 1984 soa.exe 31 PID 2712 set thread context of 1204 2712 RegSvcs.exe 21 PID 2712 set thread context of 1204 2712 RegSvcs.exe 21 PID 2472 set thread context of 1204 2472 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2712 RegSvcs.exe 2712 RegSvcs.exe 2712 RegSvcs.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe 2472 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2712 RegSvcs.exe 2712 RegSvcs.exe 2712 RegSvcs.exe 2712 RegSvcs.exe 2472 chkdsk.exe 2472 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2712 RegSvcs.exe Token: SeDebugPrivilege 2472 chkdsk.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 1984 wrote to memory of 2712 1984 soa.exe 31 PID 2712 wrote to memory of 2472 2712 RegSvcs.exe 32 PID 2712 wrote to memory of 2472 2712 RegSvcs.exe 32 PID 2712 wrote to memory of 2472 2712 RegSvcs.exe 32 PID 2712 wrote to memory of 2472 2712 RegSvcs.exe 32 PID 2472 wrote to memory of 3036 2472 chkdsk.exe 33 PID 2472 wrote to memory of 3036 2472 chkdsk.exe 33 PID 2472 wrote to memory of 3036 2472 chkdsk.exe 33 PID 2472 wrote to memory of 3036 2472 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\soa.exe"C:\Users\Admin\AppData\Local\Temp\soa.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
-