Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank.exe
Resource
win7-20240903-en
General
-
Target
Halkbank.exe
-
Size
732KB
-
MD5
8e6067fd802c5cac596f7bf91bd7e255
-
SHA1
d25e4cb1263bf84e46851c819886393a645cb1a6
-
SHA256
761a2e999afac422bbf2879ffdbd2aea8f9adc8ced10e640d7ff0e295e5ccd97
-
SHA512
cb4e0e838b83fb38fbdd3665b042a03c215ba6f02bf06e7a530195b482b7baf70ea8c14b06b92e9a5ef5fdf604b1fd5f3f8681f9b42afa9531b51e464afbc519
-
SSDEEP
12288:AujjPHHwHmUvKBkYdLvqniPB9YXo/7hGrlzV8Pb0EDzbrDcPYD1PehJOE0H9PuZ/:AMPwHTvHYdLyMMXojhGxUb0EXw+WhJOq
Malware Config
Extracted
formbook
4.1
dlwk
universitypinesseniorliving.com
mtcy0852.com
abslevha.com
breedersbatch.com
longlivegenx.com
yibaogy.com
sex8e.com
luxsot.com
arizonafinevioins.com
lalabusha.xyz
everycases.net
unhealthyisunweathly.com
anchorphonemounts.com
teachuswell.com
theshadedco.com
wallopchain.com
balitourexplore.com
resctub.com
freshlyfadedapparel.com
betamartgroceries.com
jordanbaileyportfolio.com
kellenkamm.com
starwarsnyc.com
banhsinhnhat.net
keminadentalcare.com
belocalsearch.com
cihedu-formation.com
merroir.net
rjdsouza.com
evolutionhvac.net
larepublica0.com
filmarabia.com
14dzb.com
realoneathletics.com
easx.systems
centerzasporocila.com
divishasharma.com
livinghistory.city
itsoftwarekrzysztofradwan.com
chinhhanghm46.site
may252021.com
a2zcreditrepair.com
1comcall.com
hourgroups.com
tabletz-llc.com
nliplace.com
myproductives.com
gogo90s.com
therotaryphone.com
rosaouladi.com
myfragnance.com
nhbeitai.com
medermatologia.com
7750118.com
bandweven.com
blue-wms.net
dacyclinu.com
creativehuesdesigns.com
misteraircondition.com
bryantbe.com
bdgunshi.com
51zheyang.com
israelemirates.travel
wildslaskan.com
couragepennies.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2004-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2004-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2676 set thread context of 2004 2676 Halkbank.exe 31 PID 2004 set thread context of 1200 2004 Halkbank.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2284 980 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Halkbank.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2004 Halkbank.exe 2004 Halkbank.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2004 Halkbank.exe 2004 Halkbank.exe 2004 Halkbank.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2004 Halkbank.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2004 2676 Halkbank.exe 31 PID 2676 wrote to memory of 2004 2676 Halkbank.exe 31 PID 2676 wrote to memory of 2004 2676 Halkbank.exe 31 PID 2676 wrote to memory of 2004 2676 Halkbank.exe 31 PID 2676 wrote to memory of 2004 2676 Halkbank.exe 31 PID 2676 wrote to memory of 2004 2676 Halkbank.exe 31 PID 2676 wrote to memory of 2004 2676 Halkbank.exe 31 PID 1200 wrote to memory of 980 1200 Explorer.EXE 32 PID 1200 wrote to memory of 980 1200 Explorer.EXE 32 PID 1200 wrote to memory of 980 1200 Explorer.EXE 32 PID 1200 wrote to memory of 980 1200 Explorer.EXE 32 PID 1200 wrote to memory of 980 1200 Explorer.EXE 32 PID 1200 wrote to memory of 980 1200 Explorer.EXE 32 PID 1200 wrote to memory of 980 1200 Explorer.EXE 32 PID 980 wrote to memory of 2284 980 msiexec.exe 33 PID 980 wrote to memory of 2284 980 msiexec.exe 33 PID 980 wrote to memory of 2284 980 msiexec.exe 33 PID 980 wrote to memory of 2284 980 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 2683⤵
- Program crash
PID:2284
-
-