Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe
Resource
win7-20240903-en
General
-
Target
5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe
-
Size
494KB
-
MD5
ea3273fb77952fe29c1a88dd80373815
-
SHA1
1ef9233f00ef54a305c7886a8930205d19aca664
-
SHA256
5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f
-
SHA512
cebf5707c7c9692eb1f4d47ff8860f0437947709f65f1b1598de889a23d5f3b71f126f204a314a1c5b2151bfc88c92d1e3361585f4234704a1a13487060c5bb8
-
SSDEEP
12288:0YvZWl6jiQ+sds3lXX3PgAgsFCQ73kUaP5OeJLFzaWdN8bx:0Yvwkjus+lXX3IAZFR73kUaP5bJ8pV
Malware Config
Extracted
formbook
4.1
gs2m
esdaycosmetics.com
reviewthesethings.com
380134.com
privategdcams.com
alp-n-rock.com
podgatherings.com
terrasombrafarms.com
pepperhaul.com
alsiha2020.com
coins4ever.com
divaihome.com
patinahomebyivonne.com
mywaytoindependence.com
meetsoleil.com
lifecoachingandtraining.com
jiangxishangren.com
vermontcounteystore.com
mescaping.com
angellahskitchen.com
owlhoster.com
usd111.com
afterssupply.com
workercash.com
rmguptamd.com
hfyjfqclgc.com
orlpressurewashing.com
rizzofineart.com
2dmaxximumrecords.com
infocomdsc.com
weaponxdm.online
charlestonobituaries.com
jaelmarshall.com
fireloxmusic.com
onlineprogramsmadesimple.com
confirmacionesrfea.com
getitnoww.com
activedevon.xyz
wisdomneed.com
primepatent.com
yourmatch.club
sendo.asia
guiuniversity.com
a4resssg.com
cariasferia.com
skillfules.com
colourloft.com
laichanghs.com
cestok.store
virtifest.com
advertising-analytics.com
automatednotices.com
vanessaramonett.com
traveladvisorsuccess.net
fliptruth.com
mynexthome-duvall.com
minoritybusiness.loans
teossia.com
menox.online
thehangoutcards.com
perteprampram04.net
kinobox.online
lerichina.com
iemsmbzgb.icu
helenkieu.com
northeastkitchenandbath.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4208-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4208-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3912-22-0x0000000000560000-0x000000000058F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3428 set thread context of 4208 3428 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe 93 PID 4208 set thread context of 3392 4208 MSBuild.exe 56 PID 3912 set thread context of 3392 3912 colorcpl.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4208 MSBuild.exe 4208 MSBuild.exe 4208 MSBuild.exe 4208 MSBuild.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe 3912 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4208 MSBuild.exe 4208 MSBuild.exe 4208 MSBuild.exe 3912 colorcpl.exe 3912 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4208 MSBuild.exe Token: SeDebugPrivilege 3912 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4208 3428 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe 93 PID 3428 wrote to memory of 4208 3428 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe 93 PID 3428 wrote to memory of 4208 3428 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe 93 PID 3428 wrote to memory of 4208 3428 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe 93 PID 3428 wrote to memory of 4208 3428 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe 93 PID 3428 wrote to memory of 4208 3428 5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe 93 PID 3392 wrote to memory of 3912 3392 Explorer.EXE 102 PID 3392 wrote to memory of 3912 3392 Explorer.EXE 102 PID 3392 wrote to memory of 3912 3392 Explorer.EXE 102 PID 3912 wrote to memory of 3900 3912 colorcpl.exe 103 PID 3912 wrote to memory of 3900 3912 colorcpl.exe 103 PID 3912 wrote to memory of 3900 3912 colorcpl.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe"C:\Users\Admin\AppData\Local\Temp\5b78695e898c8a3056adf8ee556007d174ddb2c3bff377c0ca53a30746419c0f.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3332
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2128
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2820
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1560
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2532
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4900
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4356
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1556
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3900
-
-