Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
skmbt ref 10072022.exe
Resource
win7-20240903-en
General
-
Target
skmbt ref 10072022.exe
-
Size
933KB
-
MD5
dc681c0d1b1a68760efaa3d0e30c265c
-
SHA1
b9af8e985e07a8ca11a5b81e7353428015c824ad
-
SHA256
866ff728d933b6a13b260cb79be66e9d17069f15fb7458673d313f6d7590864a
-
SHA512
fb1b39aba32987f6a84617870e5b3cfc9a6c54726979ad9608082b78135d91a35fd4c4ae7bd63f90c35e51d138c9d7952d93daef9ebc62f4dcbb880fd23d5de2
-
SSDEEP
12288:wGrI2iNQxZU/LPBBmJw5afc8WBuSSVwwuizH+BllvMo3Y6J2u:wGs1gUjPBwwIWcSSSeze3d3Q
Malware Config
Extracted
formbook
4.1
a1n9
mundodasmaquininhas.net
smop2.info
xn--chriemonrve-cbbu.com
kalebet977.com
inmobiliarianb.com
watersmartaz.com
xyz.gallery
sadiztech.com
traiteur-albi.fr
blocks.icu
hangrypancreas.com
saysosoulcards.com
rightforearth.com
swifty.network
bettwsrfc.co.uk
bcausemarketing.com
thaibjbar.com
zurisfashion.store
optimisescreencleaner.com
couponsjoe.com
obatsakitkanker.com
steelandcements.com
genitorisicresce.com
wwwhx951.com
kalaimani.com
wholesaleknafeh.com
house-pr.com
cameronrusticdesign.com
guiadadieta.com
italianfeetjob.com
popupdocs.net
costretch4life.com
zwnvgz.com
athlete-exchange.net
interactspeechanddrama.com
corstorphinett.club
fearofmovingforward.com
thinkbracknell.com
haberindibi.com
liamx.com
guoranspace.net
lindaedwards-music.com
recurringrevenue.online
lfxindi.com
top-of-taxi.com
domagojvida.com
joulesjordan.com
cashflowsmoothing.com
masteren-marketing-digital1.com
quoternion.com
shedsofslidell.com
jfdxpctb.net
dropmwe.online
stay2stay.com
babymoko.com
medianalyst.com
mottiinvestments.com
ppctrends.com
cemepeng.com
villainmanikata.com
servibracional.com
listgi.com
oinknoodle.com
coms-en.icu
mireolife.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2000-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2000-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2000-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2080-30-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2852 set thread context of 2000 2852 skmbt ref 10072022.exe 31 PID 2000 set thread context of 1212 2000 skmbt ref 10072022.exe 21 PID 2000 set thread context of 1212 2000 skmbt ref 10072022.exe 21 PID 2080 set thread context of 1212 2080 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skmbt ref 10072022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skmbt ref 10072022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2000 skmbt ref 10072022.exe 2000 skmbt ref 10072022.exe 2000 skmbt ref 10072022.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe 2080 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2000 skmbt ref 10072022.exe 2000 skmbt ref 10072022.exe 2000 skmbt ref 10072022.exe 2000 skmbt ref 10072022.exe 2080 wlanext.exe 2080 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2000 skmbt ref 10072022.exe Token: SeDebugPrivilege 2080 wlanext.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2000 2852 skmbt ref 10072022.exe 31 PID 2852 wrote to memory of 2000 2852 skmbt ref 10072022.exe 31 PID 2852 wrote to memory of 2000 2852 skmbt ref 10072022.exe 31 PID 2852 wrote to memory of 2000 2852 skmbt ref 10072022.exe 31 PID 2852 wrote to memory of 2000 2852 skmbt ref 10072022.exe 31 PID 2852 wrote to memory of 2000 2852 skmbt ref 10072022.exe 31 PID 2852 wrote to memory of 2000 2852 skmbt ref 10072022.exe 31 PID 2000 wrote to memory of 2080 2000 skmbt ref 10072022.exe 32 PID 2000 wrote to memory of 2080 2000 skmbt ref 10072022.exe 32 PID 2000 wrote to memory of 2080 2000 skmbt ref 10072022.exe 32 PID 2000 wrote to memory of 2080 2000 skmbt ref 10072022.exe 32 PID 2080 wrote to memory of 2592 2080 wlanext.exe 33 PID 2080 wrote to memory of 2592 2080 wlanext.exe 33 PID 2080 wrote to memory of 2592 2080 wlanext.exe 33 PID 2080 wrote to memory of 2592 2080 wlanext.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
-