Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 21:06
Static task
static1
Behavioral task
behavioral1
Sample
Oversea Sales Purchases..exe
Resource
win7-20240708-en
General
-
Target
Oversea Sales Purchases..exe
-
Size
527KB
-
MD5
1fefd4454f760fd94bcec743b13e6c6b
-
SHA1
4caa024e1494738b1951f58ff382b3c1479be067
-
SHA256
e98fbae65e642aef0ad45e52f3154a698ad6274c13e1d13e444b40b4882727bf
-
SHA512
e68e6e2e973e0d323b6801f4ad380adaf655a09ce99deaf227fcb97a371929f832a5246e25ede75d076f756797e069a0ebc039ba1e5e079c8cda1abb5fa958a4
-
SSDEEP
12288:YPPKGTI6yju065y4ypCAervisF/gvz3d21BKoiqtD001SyZvXjQbaD6:4PxI1juT5yNpC9im/Ez3dsBd/C0
Malware Config
Extracted
formbook
4.1
a34b
overse.biz
thecarths.com
bouw-service.net
xn--9kq93eezbv99d.com
rf-deer.com
cantas.site
prestizh-pol1.online
fxptjs.com
diarypedia.com
delawareescaperoom.com
ios-buscarbr.com
ahhcarina.com
queernurseconsultants.com
xycp6288.com
swamplilys.com
purposefulliving.site
rockverse.biz
assistantsincrypto.com
avantes.club
themuseumwithoutwalls.com
findanybuilder.com
panoramapet.info
rxarjuur.net
projecthomestudios.net
lcphotographyut.com
905harding.com
phantasticcreationz.com
mvd1f9jo.xyz
biecb.com
crllxjc.rest
hottesttoysforkids2021.xyz
bagufin.online
sgud.xyz
qm8917.com
kdbsesn.xyz
yuxingfurniture.com
sewafotocopybogor.com
thecaravantechnician.com
cayyoluveteriner.com
myticketsforgood.com
selaohu.xyz
tropicalvanuatu.com
quanzhoufengchaoban.com
hbrpny-leichhardt.online
walmartbook.com
cae657.xyz
4nhokitablog.com
refinedrecruitmentco.com
fightcampmedia.com
waterdns.com
weightlosspills.review
sunnahbeauty.com
murakami-eth.com
painaid.net
ohioenergyoptions.com
leuswim.com
state48doodlesandyorkies.com
visionintegral.site
bestpurchasesnow.com
metaversebreakfast.com
hmebuild.com
rayssecretsystem.com
merakaihostel.com
xkangas.com
pzw001.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2720-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2720-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1728-22-0x0000000000CB0000-0x0000000000CDF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2164 set thread context of 2720 2164 Oversea Sales Purchases..exe 93 PID 2720 set thread context of 3408 2720 Oversea Sales Purchases..exe 55 PID 1728 set thread context of 3408 1728 colorcpl.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oversea Sales Purchases..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2164 Oversea Sales Purchases..exe 2164 Oversea Sales Purchases..exe 2164 Oversea Sales Purchases..exe 2164 Oversea Sales Purchases..exe 2720 Oversea Sales Purchases..exe 2720 Oversea Sales Purchases..exe 2720 Oversea Sales Purchases..exe 2720 Oversea Sales Purchases..exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe 1728 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2720 Oversea Sales Purchases..exe 2720 Oversea Sales Purchases..exe 2720 Oversea Sales Purchases..exe 1728 colorcpl.exe 1728 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2164 Oversea Sales Purchases..exe Token: SeDebugPrivilege 2720 Oversea Sales Purchases..exe Token: SeDebugPrivilege 1728 colorcpl.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2164 wrote to memory of 4568 2164 Oversea Sales Purchases..exe 91 PID 2164 wrote to memory of 4568 2164 Oversea Sales Purchases..exe 91 PID 2164 wrote to memory of 4568 2164 Oversea Sales Purchases..exe 91 PID 2164 wrote to memory of 2916 2164 Oversea Sales Purchases..exe 92 PID 2164 wrote to memory of 2916 2164 Oversea Sales Purchases..exe 92 PID 2164 wrote to memory of 2916 2164 Oversea Sales Purchases..exe 92 PID 2164 wrote to memory of 2720 2164 Oversea Sales Purchases..exe 93 PID 2164 wrote to memory of 2720 2164 Oversea Sales Purchases..exe 93 PID 2164 wrote to memory of 2720 2164 Oversea Sales Purchases..exe 93 PID 2164 wrote to memory of 2720 2164 Oversea Sales Purchases..exe 93 PID 2164 wrote to memory of 2720 2164 Oversea Sales Purchases..exe 93 PID 2164 wrote to memory of 2720 2164 Oversea Sales Purchases..exe 93 PID 3408 wrote to memory of 1728 3408 Explorer.EXE 94 PID 3408 wrote to memory of 1728 3408 Explorer.EXE 94 PID 3408 wrote to memory of 1728 3408 Explorer.EXE 94 PID 1728 wrote to memory of 4536 1728 colorcpl.exe 95 PID 1728 wrote to memory of 4536 1728 colorcpl.exe 95 PID 1728 wrote to memory of 4536 1728 colorcpl.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Oversea Sales Purchases..exe"3⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-