Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 17:57
Behavioral task
behavioral1
Sample
dump.exe
Resource
win7-20240903-en
General
-
Target
dump.exe
-
Size
182KB
-
MD5
e0f9c6faa04bb24a6997ebe182b18ac5
-
SHA1
cf6cdc1a57321f22cbb37e87ab8238fc9adfe1a0
-
SHA256
299989e3af67223f86fd525ddcee21eb65dc912be836376717177045fd7ea032
-
SHA512
7286994b3b8efca7da0145261e0565a3921beec177dbe147dee71f9ffcee3568e38bd1a965c21f2507259c33ff9fd7a62c553bb397008dd9688d2d90f428fb86
-
SSDEEP
3072:hbxlxKeZ0r9wNa5L7BGSKiRxb5hzx+RGT7Qh4+GGJqmvZ/5c:NxuXv5XBGDixb5hV+csp2m3c
Malware Config
Extracted
formbook
4.1
pjt2
bankruptcyhelpflorida.com
yourpropertymanager.info
inevitablebites.com
liviabelezaa.com
bartonhuxley.com
headhuntersmc.com
karoshejeans.com
trevorrentals.com
overseas-assets.com
zpchanglong.com
bconomic.com
devilishweb.com
eagleusacoffee.com
thirdpartyinc.com
newyorktowservice.com
barbrs.info
digiceuticalindia.com
ftytqwfl.icu
cabinetinfirmiergomes.com
waystoconserveelectricity.com
myskinresults.com
dazhong68.com
jsud.works
extremeasset.com
theyardcardzstore.com
audrefashion.com
relandguy.com
corriescandids.com
kbuytita.com
vendemaiscorretora.com
bigbearpen.com
paraislainen.com
8aion.com
wingmanpay.com
studiowea.com
fullcourtfeed.com
veerent.com
bobbleheadstadium.com
ecoplansbrasil.com
indian-point.info
kupipuk.com
prediction.trade
simplyjandkbeauty.info
10oclocktuesday.com
richgamingtalent.com
wang-cheng.com
knockonwoodflooringservices.com
ski-occasion-pas-cher.com
duskyroseboutique.com
foursomeofexcellence.com
beijingzhoumo.com
morningdeworganics.com
glampingsparesort.com
dcepbox.today
realityeducationhk.com
invitadito.com
ssgsasia.com
desoulsante.com
tocsieumuot.com
natiemarie.com
securechild.net
ourconsultants.com
leadfromwithinacademy.com
ebraston.com
seniorjavadeveloper.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2948-2-0x0000000000A90000-0x0000000000ABE000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 3008 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2948 set thread context of 1168 2948 dump.exe 21 PID 1976 set thread context of 1168 1976 control.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2948 dump.exe 2948 dump.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe 1976 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2948 dump.exe 2948 dump.exe 2948 dump.exe 1976 control.exe 1976 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2948 dump.exe Token: SeDebugPrivilege 1976 control.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1976 1168 Explorer.EXE 31 PID 1168 wrote to memory of 1976 1168 Explorer.EXE 31 PID 1168 wrote to memory of 1976 1168 Explorer.EXE 31 PID 1168 wrote to memory of 1976 1168 Explorer.EXE 31 PID 1976 wrote to memory of 3008 1976 control.exe 32 PID 1976 wrote to memory of 3008 1976 control.exe 32 PID 1976 wrote to memory of 3008 1976 control.exe 32 PID 1976 wrote to memory of 3008 1976 control.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\dump.exe"C:\Users\Admin\AppData\Local\Temp\dump.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dump.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3008
-
-