Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
Scan 14102020 Pdf.exe
Resource
win7-20241010-en
General
-
Target
Scan 14102020 Pdf.exe
-
Size
842KB
-
MD5
ceb2a8890994def6229b5945b1a02698
-
SHA1
bf6413ba7cdb1173c57f81a306bb8c1f8f8a435c
-
SHA256
fe65fa62aa5faae469d713048c41171a0bb4546e2fd3862fcdadc38ddfb5ac35
-
SHA512
35897bbda670bb577754286e7f37223297d4428401638319640610b85b6a37e73c068862d638d296d2b91f79366e7ed913eea652243eaf500f72b9dc0fef86e8
-
SSDEEP
12288:uywTFD6r91Yk/yHVMSVBltzbGmbaLd7OzlpUFN55ywJLxK/SWpqpAEuIU/1v:kgp1Yk2MEltHfGLdefUJ5BLrnTU/1
Malware Config
Extracted
formbook
4.1
cxs
padronadominante.com
comparativeadvantage0.com
city60work.site
sewardtaxiservices.com
discipleteam.com
davicostone.net
dein-novoline.com
zahnaerzte-ungarn.com
kulakslastmaras.com
ctmm.digital
texasbriefing.com
andreaswidowitz.com
qygmuakhx.club
10002.com
darseke.com
saneindia.com
sheamourintimates.com
7keymusicgroup.com
heikeheitmann.com
gmtransports.com
fadin.xyz
nowaythisisreal.com
suprimpex.com
premiumsugarcane.com
lugaresturisticosenperu.com
thaimovies.info
marybethmichaud.com
byronbridal.com
wegotyourbackcoaching.com
gangashi.com
ecoloversmarket.com
meinolot.com
markdanial.com
thepitonedge.com
ajkerfaridpur.net
professor.college
spasec.net
lucidchina.com
m-midas.com
svradionewyork.com
player-research.com
tuvanduhoctc.com
hotelorchid.com
yourjacksonvilletrainers.com
accurico.com
img-a.club
dinkydev.com
influoresens.com
offerdaily.club
leveltoshop.com
creidenergysystem.com
ecoverblackpack.com
arealnursepodcast.com
pierorealestate.com
rusabesi.com
singingschool2studio.com
complimentaryentrypass.com
thefutureisnyc.com
michaelsavave.com
atnightcom.com
seo4amz.com
somehello.com
secretqueens.net
xcusehqaree.com
cetcx1.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2296-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2296-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2296-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2492 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2084 set thread context of 2296 2084 Scan 14102020 Pdf.exe 31 PID 2296 set thread context of 1200 2296 Scan 14102020 Pdf.exe 21 PID 2296 set thread context of 1200 2296 Scan 14102020 Pdf.exe 21 PID 1484 set thread context of 1200 1484 colorcpl.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scan 14102020 Pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2084 Scan 14102020 Pdf.exe 2296 Scan 14102020 Pdf.exe 2296 Scan 14102020 Pdf.exe 2296 Scan 14102020 Pdf.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe 1484 colorcpl.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2084 Scan 14102020 Pdf.exe 2296 Scan 14102020 Pdf.exe 2296 Scan 14102020 Pdf.exe 2296 Scan 14102020 Pdf.exe 2296 Scan 14102020 Pdf.exe 1484 colorcpl.exe 1484 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2296 Scan 14102020 Pdf.exe Token: SeDebugPrivilege 1484 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2296 2084 Scan 14102020 Pdf.exe 31 PID 2084 wrote to memory of 2296 2084 Scan 14102020 Pdf.exe 31 PID 2084 wrote to memory of 2296 2084 Scan 14102020 Pdf.exe 31 PID 2084 wrote to memory of 2296 2084 Scan 14102020 Pdf.exe 31 PID 1200 wrote to memory of 1484 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1484 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1484 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1484 1200 Explorer.EXE 32 PID 1484 wrote to memory of 2492 1484 colorcpl.exe 33 PID 1484 wrote to memory of 2492 1484 colorcpl.exe 33 PID 1484 wrote to memory of 2492 1484 colorcpl.exe 33 PID 1484 wrote to memory of 2492 1484 colorcpl.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Scan 14102020 Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Scan 14102020 Pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Scan 14102020 Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Scan 14102020 Pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Scan 14102020 Pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2492
-
-