Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
S L BIOCHEMICAL PO_SLB210624-001.exe
Resource
win7-20240903-en
General
-
Target
S L BIOCHEMICAL PO_SLB210624-001.exe
-
Size
732KB
-
MD5
e080f8498204a27c100b487099c9bc85
-
SHA1
ec1198350f44ca88ec3c7d94dc1c9636b464de27
-
SHA256
2d39ede32baaeb5a699bdd7b8dc085f2b69e5a054d775cce6cce493845e786a7
-
SHA512
3c539c8614c0ad4190f7df4fa905669aceac780150f3d37b70a1ace7f3395f818e65f804644868a0cf3fa22c5c62f77d1b22a6cb50e71441cb21b82d18d16acc
-
SSDEEP
12288:eBgmqtCwHmUPYBQ44z/nd6lkwMEO5IRYELQYOdyniTKRSYMXwyTlokBRed:eBkbHTPY644bdurMxCRY7dyLSYMX9Gcu
Malware Config
Extracted
formbook
4.1
bgr7
jgcrwashmo.com
ecoonline.club
jet-cell.com
fhcqtravel.com
pasoroblesreport.com
kong-net.com
hotelplazadelta.com
thomaskindergartentigers.com
reeclutador.net
gallendesign.com
sharingofbreadpantry.com
huanqiubang.net
shandyinaz.com
roditelisvoi.online
vojistats.com
leleche.ltd
abronov.online
zipperkitty.com
spidertim.com
desperateprotector.com
cenfoxy.com
iloveyoucovid.com
massteck.com
highlandsranchproperties.com
erkitap.com
mamadang.com
lesbiansextips.pictures
bikesabina.com
topfoxmarketing.com
cleantechchampions.com
benvallancephotography.com
chicagodancemedium.net
attavv.com
policyadministrator.com
samisoldecors.com
covishots.com
acme-novelty.com
lisahayescounseling.com
longriverdanvilleva.com
bulasi.com
wzocflfof.com
bristolvahome.com
gaywatches.com
thesuccessjourneycoach.com
izumospace.com
xn--hebaey3a.xn--9dbq2a
binibinpara.com
hempflavorextracts.com
associa.support
fastparts247.com
prettipleeze.com
jalesrpg.net
muvudo.com
virtucoaches.com
myceliumresearch.com
loclalbitcoins.com
annadavidpod.com
creativesoulsclubs.com
wubaiyule.com
c04aadomes.online
propertyinjhansi.com
airgra.com
livingwithinstinct.com
winkore.com
collectionicity.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3008-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3008-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4960 set thread context of 3008 4960 S L BIOCHEMICAL PO_SLB210624-001.exe 91 PID 3008 set thread context of 3488 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 56 PID 3052 set thread context of 3488 3052 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S L BIOCHEMICAL PO_SLB210624-001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe 3052 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 3008 S L BIOCHEMICAL PO_SLB210624-001.exe 3052 wscript.exe 3052 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 S L BIOCHEMICAL PO_SLB210624-001.exe Token: SeDebugPrivilege 3052 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3008 4960 S L BIOCHEMICAL PO_SLB210624-001.exe 91 PID 4960 wrote to memory of 3008 4960 S L BIOCHEMICAL PO_SLB210624-001.exe 91 PID 4960 wrote to memory of 3008 4960 S L BIOCHEMICAL PO_SLB210624-001.exe 91 PID 4960 wrote to memory of 3008 4960 S L BIOCHEMICAL PO_SLB210624-001.exe 91 PID 4960 wrote to memory of 3008 4960 S L BIOCHEMICAL PO_SLB210624-001.exe 91 PID 4960 wrote to memory of 3008 4960 S L BIOCHEMICAL PO_SLB210624-001.exe 91 PID 3488 wrote to memory of 3052 3488 Explorer.EXE 92 PID 3488 wrote to memory of 3052 3488 Explorer.EXE 92 PID 3488 wrote to memory of 3052 3488 Explorer.EXE 92 PID 3052 wrote to memory of 4524 3052 wscript.exe 93 PID 3052 wrote to memory of 4524 3052 wscript.exe 93 PID 3052 wrote to memory of 4524 3052 wscript.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\S L BIOCHEMICAL PO_SLB210624-001.exe"C:\Users\Admin\AppData\Local\Temp\S L BIOCHEMICAL PO_SLB210624-001.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\S L BIOCHEMICAL PO_SLB210624-001.exe"C:\Users\Admin\AppData\Local\Temp\S L BIOCHEMICAL PO_SLB210624-001.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\S L BIOCHEMICAL PO_SLB210624-001.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-