Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
bothb4762.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bothb4762.exe
Resource
win10v2004-20241007-en
General
-
Target
bothb4762.exe
-
Size
291KB
-
MD5
e40716ec136991058a86358953c71a27
-
SHA1
08401ceead3c6cbd5e4d187b29b6fdf9725cf63d
-
SHA256
f1e8731c7e1849989749c9ff23497e310025a9536fea8d25ccab050db2fffe33
-
SHA512
a6cd0a9194da99a1dedbc1d99b0bd600a055aa1b9478a1d7831ab88e64dd0216b11eef0d24c128bcd77d0e68273fb961f1ff8ff230056379ca48108a64d25b11
-
SSDEEP
6144:MfAn+VymyRH+jffLf+4J+8IiTA7PmgtZrZ+XWlu:MfAOBYejffLRw8IjjrYGE
Malware Config
Extracted
formbook
4.1
lt0h
originalindigofurniture.co.uk
fl6588.com
acecademy.com
yaerofinerindalnalising.com
mendilovic.online
rishenght.com
famlees.com
myhomeofficemarket.com
bouquetarabia.com
chrisbani.com
freebandslegally.com
hernandezinsurancegroup.net
slicedandfresh.com
apnathikanas.com
chadhatesyou.com
ansilsas.com
in3development.com
nitiren.net
peespn.com
valengz.com
theseakelpcompany.com
tlcrentny.com
sancakcraft.com
kamenb.com
samanthajobenson.com
alphagearz.com
sprins.net
adestramentos.com
civoconstruction.com
masrmasr.com
jagrit.codes
zusammenurlaub.com
mssjqs.com
ic695niu001.com
anelimplus.com
mutlob.com
beyondmickey.net
sliever.club
perfumefashion.icu
massimilianogiannocco.com
dentoncountyattorneys.media
filigreefilly.com
mooremgmtandcompany.com
smpdj.com
stainlesspropmgmt.com
creativecollectivecommunity.com
dmdrogist.com
spokenandheardpodcast.com
garenbid.com
bestcomandcalls.space
tairunshihua.com
nemski-projekt.com
6mum.com
portlandhemorrhoidcenter.com
platinumforsale.net
driven.plus
ontheedgeoutdoorshunting.com
manatapmasalalu.com
idscustomprinting.com
safepassagereform.com
fairop.xyz
natetacticz.com
etoys-sucks.com
rhinolabs.net
bulverderoofing.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1532-2-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1532-5-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2600 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2312 set thread context of 1532 2312 bothb4762.exe 31 PID 1532 set thread context of 1224 1532 bothb4762.exe 21 PID 844 set thread context of 1224 844 cscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bothb4762.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1532 bothb4762.exe 1532 bothb4762.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe 844 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2312 bothb4762.exe 1532 bothb4762.exe 1532 bothb4762.exe 1532 bothb4762.exe 844 cscript.exe 844 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1532 bothb4762.exe Token: SeDebugPrivilege 844 cscript.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1532 2312 bothb4762.exe 31 PID 2312 wrote to memory of 1532 2312 bothb4762.exe 31 PID 2312 wrote to memory of 1532 2312 bothb4762.exe 31 PID 2312 wrote to memory of 1532 2312 bothb4762.exe 31 PID 2312 wrote to memory of 1532 2312 bothb4762.exe 31 PID 1224 wrote to memory of 844 1224 Explorer.EXE 32 PID 1224 wrote to memory of 844 1224 Explorer.EXE 32 PID 1224 wrote to memory of 844 1224 Explorer.EXE 32 PID 1224 wrote to memory of 844 1224 Explorer.EXE 32 PID 844 wrote to memory of 2600 844 cscript.exe 33 PID 844 wrote to memory of 2600 844 cscript.exe 33 PID 844 wrote to memory of 2600 844 cscript.exe 33 PID 844 wrote to memory of 2600 844 cscript.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2600
-
-