Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
Benetti yacht Enquiry.exe
Resource
win7-20240708-en
General
-
Target
Benetti yacht Enquiry.exe
-
Size
1.1MB
-
MD5
ea25c184df955f5e4382ce73fe3eb6bb
-
SHA1
da5ed9ab355a3e5912c3186e3c372b68ffddd8c1
-
SHA256
b4932161d592d2b1c33be7ef495b873434ea47f9031e44b31338a041b22394ba
-
SHA512
7fc6bce7097865be62bf45064120e24bbfef026adcef39ad99dbb6533fd7c4de471a67c5982ca930ba8955e991fa92fdca12c8bf1c3f97c0b9077c8a82b661b5
-
SSDEEP
24576:cFOsBgo0q4wMMBmCmTOUd+L6kaXWUp5xzc0B4p+v/5QjK5pqiebU:cEoHMUmCm6Ud+zaXPJcaW+H5QjspqieQ
Malware Config
Extracted
formbook
4.1
gmtr
kocnetelgroup.com
william-and-alexandra.com
overseasdata.com
the-wild-wild-east.com
analistaweb.net
hybridkarts.com
secure-apple-ld.com
semjasessprx.com
ahaa.store
9maskgame.online
bellydancer-cicycai.com
qy35tc.com
immopix.net
catarinayamamoto.com
binvestcrm.com
mycsource.com
cookedonpropane.net
melmorg.com
mattkalita.com
animalkitchen.net
flixnite.com
talitadeoliveira.com
eola-nutrizione.com
hb3trk.com
onesave.club
mottinoymca.com
luanaevinicius.com
donalddruck.com
setupreports.com
uluminista-cp.com
labor-utilize.info
blacdomaine.com
decentvulturedesign.com
dancingwhenitrains.com
herbycat.com
jama3.com
nieght.com
miamiluxurioushomes4sale.com
saludalinstante.website
certifiedyogi.com
coreyandtanya2020.vegas
imustconfessimagoddess.com
fashiontoshop.com
tuiwang.net
outlier.house
portmacquariedistillery.com
novlaidya.com
morning-glorypharms.com
forummacau.com
bishisei-mitte.com
covidus19.com
wokbuyersguide.com
luxurytimemart.com
nibrasalkhaleej.com
cevplay.com
unlimitedfuturesmastermind.com
uptownsouthpadre.com
savingz.info
connectingpeopletoland.com
die-zukunftsgestalter.com
azautobrokers.net
theqblegacy.com
applicationcall.com
june-eve.com
santanabeautycares.com
Signatures
-
Formbook family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/1524-8-0x0000000005280000-0x0000000005292000-memory.dmp CustAttr -
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/536-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/536-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/536-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1524 set thread context of 536 1524 Benetti yacht Enquiry.exe 102 PID 536 set thread context of 3504 536 Benetti yacht Enquiry.exe 56 PID 536 set thread context of 3504 536 Benetti yacht Enquiry.exe 56 PID 4600 set thread context of 3504 4600 cscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Benetti yacht Enquiry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Benetti yacht Enquiry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe 4600 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 536 Benetti yacht Enquiry.exe 4600 cscript.exe 4600 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 536 Benetti yacht Enquiry.exe Token: SeDebugPrivilege 4600 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1524 wrote to memory of 536 1524 Benetti yacht Enquiry.exe 102 PID 1524 wrote to memory of 536 1524 Benetti yacht Enquiry.exe 102 PID 1524 wrote to memory of 536 1524 Benetti yacht Enquiry.exe 102 PID 1524 wrote to memory of 536 1524 Benetti yacht Enquiry.exe 102 PID 1524 wrote to memory of 536 1524 Benetti yacht Enquiry.exe 102 PID 1524 wrote to memory of 536 1524 Benetti yacht Enquiry.exe 102 PID 536 wrote to memory of 4600 536 Benetti yacht Enquiry.exe 117 PID 536 wrote to memory of 4600 536 Benetti yacht Enquiry.exe 117 PID 536 wrote to memory of 4600 536 Benetti yacht Enquiry.exe 117 PID 4600 wrote to memory of 4892 4600 cscript.exe 118 PID 4600 wrote to memory of 4892 4600 cscript.exe 118 PID 4600 wrote to memory of 4892 4600 cscript.exe 118
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\Benetti yacht Enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Benetti yacht Enquiry.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Benetti yacht Enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Benetti yacht Enquiry.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Benetti yacht Enquiry.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4892
-
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:216
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4588
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4344
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:932
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4048
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:684
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:656
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3700
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4416
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4944
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1696
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3680
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2892
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2360
-