Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
PO 211210-02B.exe
Resource
win7-20241010-en
General
-
Target
PO 211210-02B.exe
-
Size
1.0MB
-
MD5
4064e9b07c90788942f5d4ca84fe93dd
-
SHA1
9e7b93ea418d60a11d191a9d0a368d2880c2abb0
-
SHA256
98318bf03a710984e1eaa61e8fe1ceb1f78cefb0de3ee8168dff8e4b144d6b42
-
SHA512
067eb0ffeff7d61c3bf5b1cb8f28df9432f564d055b4a730573b37ce51aaaff9766b00aec072e3177b730ff3a4dbe635b1964fbb0667c713ec5a0e6c88a65f8e
-
SSDEEP
24576:qlEGxQTnyni55j63p5zpKeZJ6wprm0W7nNM5VtcYTPy0AiQmywV7Nt+bSp/l:qpxayniu3/tKeZZpr/W7wBTPHRQBYBtX
Malware Config
Extracted
formbook
4.1
kz21
affordableshopper.com
federalpensioneducation.com
nguyenphuc.xyz
tbryantnotarysvcs.com
satgerv.online
yis.xyz
sailing-dreams.online
saairconditioners.com
compassioncommunity.net
vickyrubs.com
uniqueprorental.com
xplus-main.xyz
beforetravelthai.com
mentaltrainer.net
bianko.xyz
postsandnews.com
stream-king.com
citizen.guide
lasuiterennes.com
elektroexpress24.com
kolkatanewspaper.xyz
digitalstore.space
konglish.xyz
cultureangel.com
carelegend.com
illuminategodslove.com
realisatiedomein3.com
homes62.com
leapsoffaithwaterskiers.com
shihuod.com
masteknoloji.net
vifi-web.com
winchesterstablesofvermont.com
theholdscarborough.com
sf9oh3.net
usdbet797.com
economiareale.info
gearinternetdeals.com
new-carbuycrossoversuv.website
losconquistadoreshotel.com
storetees.art
hotelkompendium.com
hohmbathhouse.com
graviitycloud.online
mewstralia.com
domesticelectriciankent.com
rentalserver-kurabe.com
jrkennington.com
register-coinex.online
iywin.com
laviniaribeiro.site
lorodicahmdpa22.xyz
mebelrosso.com
topratedales.com
kastyelie.xyz
weeventos.com
szefrxsa.xyz
fyuc.info
competition-malachite.com
onlinebatch.space
ida-info.com
fakeituntil.com
lm-safe-keepingmdpa22.xyz
tammooz.site
cingetkuiert.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3404-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3404-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3296-22-0x0000000000960000-0x000000000098F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2520 set thread context of 3404 2520 PO 211210-02B.exe 91 PID 3404 set thread context of 3504 3404 PO 211210-02B.exe 56 PID 3296 set thread context of 3504 3296 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO 211210-02B.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3404 PO 211210-02B.exe 3404 PO 211210-02B.exe 3404 PO 211210-02B.exe 3404 PO 211210-02B.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe 3296 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3404 PO 211210-02B.exe 3404 PO 211210-02B.exe 3404 PO 211210-02B.exe 3296 chkdsk.exe 3296 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3404 PO 211210-02B.exe Token: SeDebugPrivilege 3296 chkdsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3404 2520 PO 211210-02B.exe 91 PID 2520 wrote to memory of 3404 2520 PO 211210-02B.exe 91 PID 2520 wrote to memory of 3404 2520 PO 211210-02B.exe 91 PID 2520 wrote to memory of 3404 2520 PO 211210-02B.exe 91 PID 2520 wrote to memory of 3404 2520 PO 211210-02B.exe 91 PID 2520 wrote to memory of 3404 2520 PO 211210-02B.exe 91 PID 3504 wrote to memory of 3296 3504 Explorer.EXE 92 PID 3504 wrote to memory of 3296 3504 Explorer.EXE 92 PID 3504 wrote to memory of 3296 3504 Explorer.EXE 92 PID 3296 wrote to memory of 1356 3296 chkdsk.exe 93 PID 3296 wrote to memory of 1356 3296 chkdsk.exe 93 PID 3296 wrote to memory of 1356 3296 chkdsk.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-