Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240903-en
General
-
Target
1.exe
-
Size
743KB
-
MD5
23713e079ab57e334b8cb4116e7a1318
-
SHA1
7f1a8448ccc5ccf5e3758055f89ee156e1a17ff6
-
SHA256
c89757583d8df1ff56a4a8a4efa66666d02af3807b60cd058031afe1aebaeda8
-
SHA512
134aa0ab39d5f4241362753c9a414542673a66ccebea89910ce867574e5075c880052f89cc946e1d735e904eef2685c8598c4f39ec82a5c54c60a1e5a47e43b8
-
SSDEEP
12288:bxojH5jdL/KyCR7PqRo2YQLa3RFC7cvoLTKF99AQ056islwo8ZHo:+ljBKnRIIQOhKcCTKFPAQ05Dslwb5
Malware Config
Extracted
formbook
4.1
x0h
kairos-go.com
news3091.photography
champlin.biz
callmekondoor.com
makrobet109.com
schoolwearworldwide.com
abelabramyan.com
szbtps.com
okanega-karireru.com
goldenwestflooring.com
hemptactics.com
fshsst-ar.com
securityupdates2.site
lhot.ltd
mgaklubspa.com
benefitsofcrossfit.com
stuff.blue
yingjia168.com
audio2mp3.com
live-outlook-login.com
throughthelensoflexie.com
hacqshnp.com
kjcgmall.com
gangazoz.com
neetgang.biz
hotcoupons.site
proyogis.com
dyexim.com
marketingfloral.com
indonesienanwalt.com
downwithjoel.com
flauntandflatter.com
superusams.com
automasa.seat
tinasonestop.com
domainstolease.com
vanrin.com
thequeenslandsagas.com
happymind555.com
530198.com
5rptd.com
destira-archive.com
foshan101lighting.com
freetrafficbox.com
seater.online
thaiyoseo.com
somesoma.com
bostonrefinancemagazine.com
iamtrburns.com
superiorprocarehomeprovider.com
tedxnagyerdo.com
cybse.com
arkansilverchat.net
tiff.tips
tksvideo.com
vecchiolegal.com
salishsailing.com
constructoraiberconsa.com
thepinkpineapplelife.com
elevamus.com
pizzeriailportico.com
timgarvey.net
enthusiasticrunners.com
howwillmycardie.com
becouf.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1600-4-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/1600-7-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2532 set thread context of 1600 2532 1.exe 30 PID 1600 set thread context of 1192 1600 1.exe 21 PID 2528 set thread context of 1192 2528 ipconfig.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2528 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2532 1.exe 1600 1.exe 1600 1.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe 2528 ipconfig.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2532 1.exe 1600 1.exe 1600 1.exe 1600 1.exe 2528 ipconfig.exe 2528 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1600 1.exe Token: SeDebugPrivilege 2528 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1600 2532 1.exe 30 PID 2532 wrote to memory of 1600 2532 1.exe 30 PID 2532 wrote to memory of 1600 2532 1.exe 30 PID 2532 wrote to memory of 1600 2532 1.exe 30 PID 1192 wrote to memory of 2528 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2528 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2528 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2528 1192 Explorer.EXE 31 PID 2528 wrote to memory of 2564 2528 ipconfig.exe 32 PID 2528 wrote to memory of 2564 2528 ipconfig.exe 32 PID 2528 wrote to memory of 2564 2528 ipconfig.exe 32 PID 2528 wrote to memory of 2564 2528 ipconfig.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2564
-
-