Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
soa.exe
Resource
win7-20240903-en
General
-
Target
soa.exe
-
Size
451KB
-
MD5
db7035b451f169a670b56a3a023b18e8
-
SHA1
d586fb0dbdfb1a37cf8097c3f11f4db745e9faa9
-
SHA256
aeccef59002b851b685cf54307f906c06adb065b68c3eff112f4b0f1442d1349
-
SHA512
fc6f4c6321747aa92301f8ac3d01cae40ad5d51df1cf294e179bd866537de0f5cef7f1b17616efbc2194679b7d7eff8b807d9d1ef9dc12331c497cbb4f89d707
-
SSDEEP
6144:rr5h1r6lmPMk8X25ahxL4XUhaGFo69nwTge6qG5yjNeQFgv8dKgvW:rrH1GIUk83xLfHSTg5qGIjNeDCKg
Malware Config
Extracted
formbook
4.1
bg6
uvs57.info
perfectpointapparel.com
sportsthrem.com
debowerdesigns.com
wzjs99.com
chothuexenangxecauninhbinh.com
blackkeymanagement.com
verdesonline.com
hezehzxx0530.com
alientechcenterlondon.com
body-suit.com
pcfip.com
perocreations.com
mingary.life
goldengoddessglamour.com
reparmaxpro.com
xn--fiqv1al2p20d348d.com
yourhomehealthcarellc.net
weddingproper.com
felicityhorseclub.com
pizzazucca.com
ausu96.com
nathanaeltrahan.com
kenabet.com
madebykat.com
kymsusujinsha.com
zds9999.com
uscawm.com
radhakrishnajeweller.com
bigexchanger.com
iptv008008.com
fhgks.info
sunflowerenergy.net
ernestospaccesi.com
thecyclingvegan.com
vcyrl.info
oliviavaldes.com
xn--iphone-gw7i830b0nltm4k.com
capitalrealestateservices.com
loziship.com
cumulustitle.com
collin-orl.com
842cedar.info
aiico88.com
vivalabavaria.com
heroin.tech
xn--vs2b19v.com
vehiclenotes.com
theoldcaliforniashow.com
incubatorplatform.com
metabolism-news.com
fifatee.com
idea-procedure.tech
sanamastore.com
topguardehub.com
howest.rocks
vanchuyenhanghoagiare.net
middletowntowingservices.com
newsroompk.com
outlawshavingco.com
152manbet.com
tunisiennenue.com
cakeconstructionsupply.com
tictmaster.com
flekcht.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3940-6-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/3940-11-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1596 set thread context of 3940 1596 soa.exe 100 PID 3940 set thread context of 3516 3940 RegSvcs.exe 56 PID 4856 set thread context of 3516 4856 control.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 1596 soa.exe 1596 soa.exe 1596 soa.exe 3940 RegSvcs.exe 3940 RegSvcs.exe 3940 RegSvcs.exe 3940 RegSvcs.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe 4856 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3940 RegSvcs.exe 3940 RegSvcs.exe 3940 RegSvcs.exe 4856 control.exe 4856 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1596 soa.exe Token: SeDebugPrivilege 3940 RegSvcs.exe Token: SeDebugPrivilege 4856 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2176 1596 soa.exe 99 PID 1596 wrote to memory of 2176 1596 soa.exe 99 PID 1596 wrote to memory of 2176 1596 soa.exe 99 PID 1596 wrote to memory of 3940 1596 soa.exe 100 PID 1596 wrote to memory of 3940 1596 soa.exe 100 PID 1596 wrote to memory of 3940 1596 soa.exe 100 PID 1596 wrote to memory of 3940 1596 soa.exe 100 PID 1596 wrote to memory of 3940 1596 soa.exe 100 PID 1596 wrote to memory of 3940 1596 soa.exe 100 PID 3516 wrote to memory of 4856 3516 Explorer.EXE 101 PID 3516 wrote to memory of 4856 3516 Explorer.EXE 101 PID 3516 wrote to memory of 4856 3516 Explorer.EXE 101 PID 4856 wrote to memory of 4560 4856 control.exe 102 PID 4856 wrote to memory of 4560 4856 control.exe 102 PID 4856 wrote to memory of 4560 4856 control.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\soa.exe"C:\Users\Admin\AppData\Local\Temp\soa.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:2176
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-