Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe
Resource
win7-20241010-en
General
-
Target
f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe
-
Size
621KB
-
MD5
fb46da403e7f8d031ccd553e79e8f5ce
-
SHA1
4385f614789f5472cab4f7f89d24dc3e454e05d5
-
SHA256
f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3
-
SHA512
624505e6df86dd4a09ae22acc3bcfa7e5e329adf8c0bc5cccd4236a9bb6901cce4eaeab52f01e94dc530ad5a353f6e736d13a75ee7c739329c88120b87083e14
-
SSDEEP
12288:SYxaM8KuQaGxtVMwg5a8CPWuImvsP4oNeA:8jQLMT/CTpvsQo
Malware Config
Extracted
formbook
4.1
i6sj
earn1kdaily.com
inspirestudiopro.com
dirtiblvk.com
humanbehaviourschool.com
tsftextiles.com
viveroeljardindelaabuela.com
surreykeys.com
sf790.com
evergreenmortuary-cemetary.com
pspbizhi.com
ironwoodpianostudios.com
outrageouslywise.com
blacklivesmatterisajoke.com
reignauto.com
azw3.net
nondapack.com
dressahaulicboutique.com
pierrockellelive.com
theleagueofgeeks.com
matthiaswalpen.com
essentiallyourscandles.com
fashionable5g.com
socialyouth.life
inspireleadershipschool.com
helpme3dprint.com
kvzedhicva.com
antorcha.church
redarmy2020.com
q88kk.com
iamsock.com
ivassociation.com
rothsteinlogistics.com
robustpaul.com
gaypridedirectory.com
stashan.com
hindinature.com
globalinkservices.com
wncadventures.com
nishinren.com
ntxelitefriendlies.com
mienfermentedbeanpaste.com
ketosisbulletproof.com
andreaslundgren.com
pamprivate.com
unfreeamericans.com
tenancy360.com
nieght.com
efectocoach.com
katharinehepcat.com
produkti-vr.com
batesvilletoolingdesigninc.com
gojourney.cloud
healthiercravings.com
tmd38.com
modulos.online
enierena.com
igarath.com
trippie.club
ibluedotpanowdmall.com
peopleplatform.co
mintanahudson.com
operasjonsklinikken.com
operation-alpha.com
mbpublishingco.com
ggoldcollections.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/1388-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1388-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 388 set thread context of 1388 388 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 91 PID 1388 set thread context of 3440 1388 RegSvcs.exe 56 PID 2616 set thread context of 3440 2616 cscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1388 RegSvcs.exe 1388 RegSvcs.exe 1388 RegSvcs.exe 1388 RegSvcs.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe 2616 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1388 RegSvcs.exe 1388 RegSvcs.exe 1388 RegSvcs.exe 2616 cscript.exe 2616 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1388 RegSvcs.exe Token: SeDebugPrivilege 2616 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 388 wrote to memory of 1388 388 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 91 PID 388 wrote to memory of 1388 388 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 91 PID 388 wrote to memory of 1388 388 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 91 PID 388 wrote to memory of 1388 388 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 91 PID 388 wrote to memory of 1388 388 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 91 PID 388 wrote to memory of 1388 388 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 91 PID 3440 wrote to memory of 2616 3440 Explorer.EXE 93 PID 3440 wrote to memory of 2616 3440 Explorer.EXE 93 PID 3440 wrote to memory of 2616 3440 Explorer.EXE 93 PID 2616 wrote to memory of 1664 2616 cscript.exe 94 PID 2616 wrote to memory of 1664 2616 cscript.exe 94 PID 2616 wrote to memory of 1664 2616 cscript.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe"C:\Users\Admin\AppData\Local\Temp\f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:5084
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-