Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank.exe
Resource
win7-20240903-en
General
-
Target
Halkbank.exe
-
Size
732KB
-
MD5
8e6067fd802c5cac596f7bf91bd7e255
-
SHA1
d25e4cb1263bf84e46851c819886393a645cb1a6
-
SHA256
761a2e999afac422bbf2879ffdbd2aea8f9adc8ced10e640d7ff0e295e5ccd97
-
SHA512
cb4e0e838b83fb38fbdd3665b042a03c215ba6f02bf06e7a530195b482b7baf70ea8c14b06b92e9a5ef5fdf604b1fd5f3f8681f9b42afa9531b51e464afbc519
-
SSDEEP
12288:AujjPHHwHmUvKBkYdLvqniPB9YXo/7hGrlzV8Pb0EDzbrDcPYD1PehJOE0H9PuZ/:AMPwHTvHYdLyMMXojhGxUb0EXw+WhJOq
Malware Config
Extracted
formbook
4.1
dlwk
universitypinesseniorliving.com
mtcy0852.com
abslevha.com
breedersbatch.com
longlivegenx.com
yibaogy.com
sex8e.com
luxsot.com
arizonafinevioins.com
lalabusha.xyz
everycases.net
unhealthyisunweathly.com
anchorphonemounts.com
teachuswell.com
theshadedco.com
wallopchain.com
balitourexplore.com
resctub.com
freshlyfadedapparel.com
betamartgroceries.com
jordanbaileyportfolio.com
kellenkamm.com
starwarsnyc.com
banhsinhnhat.net
keminadentalcare.com
belocalsearch.com
cihedu-formation.com
merroir.net
rjdsouza.com
evolutionhvac.net
larepublica0.com
filmarabia.com
14dzb.com
realoneathletics.com
easx.systems
centerzasporocila.com
divishasharma.com
livinghistory.city
itsoftwarekrzysztofradwan.com
chinhhanghm46.site
may252021.com
a2zcreditrepair.com
1comcall.com
hourgroups.com
tabletz-llc.com
nliplace.com
myproductives.com
gogo90s.com
therotaryphone.com
rosaouladi.com
myfragnance.com
nhbeitai.com
medermatologia.com
7750118.com
bandweven.com
blue-wms.net
dacyclinu.com
creativehuesdesigns.com
misteraircondition.com
bryantbe.com
bdgunshi.com
51zheyang.com
israelemirates.travel
wildslaskan.com
couragepennies.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/1388-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1388-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5112 set thread context of 1388 5112 Halkbank.exe 102 PID 1388 set thread context of 3516 1388 Halkbank.exe 56 PID 3456 set thread context of 3516 3456 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Halkbank.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1388 Halkbank.exe 1388 Halkbank.exe 1388 Halkbank.exe 1388 Halkbank.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1388 Halkbank.exe 1388 Halkbank.exe 1388 Halkbank.exe 3456 rundll32.exe 3456 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1388 Halkbank.exe Token: SeDebugPrivilege 3456 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1388 5112 Halkbank.exe 102 PID 5112 wrote to memory of 1388 5112 Halkbank.exe 102 PID 5112 wrote to memory of 1388 5112 Halkbank.exe 102 PID 5112 wrote to memory of 1388 5112 Halkbank.exe 102 PID 5112 wrote to memory of 1388 5112 Halkbank.exe 102 PID 5112 wrote to memory of 1388 5112 Halkbank.exe 102 PID 3516 wrote to memory of 3456 3516 Explorer.EXE 103 PID 3516 wrote to memory of 3456 3516 Explorer.EXE 103 PID 3516 wrote to memory of 3456 3516 Explorer.EXE 103 PID 3456 wrote to memory of 3996 3456 rundll32.exe 104 PID 3456 wrote to memory of 3996 3456 rundll32.exe 104 PID 3456 wrote to memory of 3996 3456 rundll32.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3996
-
-