Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
jestyyfre44321.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
jestyyfre44321.exe
Resource
win10v2004-20241007-en
General
-
Target
jestyyfre44321.exe
-
Size
1.1MB
-
MD5
c2d4e5290155193ed854fc6d27ec83a4
-
SHA1
de83fd85e5496b9ccc8f56bd162d27381835c1af
-
SHA256
e4c4e4111a17d0130da8cfb7694900d1d7f16bfb74ab45eff550e6319d88a602
-
SHA512
e873f5dc3e318be701bbcdc55f2a61060e72a54c58c17fc2b339b9faf5b9b52f764241d7c6f1c5758884fa76cb1257c605ea2cc1c9d085e99fd51fd457e65e73
-
SSDEEP
24576:UAOcZXcxP6P4C6oV5Ogn+pN6k77rvyOMF5:CH9C6qX+pN6kDbE5
Malware Config
Extracted
formbook
4.1
je14
innervisionbuildings.com
theenergysocialite.com
565548.com
panghr.com
onlyonesolutions.com
stjohnzone6.com
cnotes.rest
helfeb.online
xixi-s-inc.club
easilyentered.com
theshopx.store
mrclean-ac.com
miamibeachwateradventures.com
jpearce.co.uk
seseragi-bunkou.com
minimaddie.com
commbank-help-849c3.com
segohandelsonderneming.com
namthanhreal.com
fototerapi.online
your-download.com
klindt.one
sellerscourt.com
francoislambert.store
smokedoutvapes.co.uk
rundacg.com
flavors-and-spices-lyon.com
qifengsuo.com
sunnyislesgardens.com
tunneldutransit.com
restorecodes.website
blast4me.com
bingser.space
co-gpco.com
emporioaliwen.com
mr5g.com
abcp666.com
consulvip.net
sagaming168.info
zjpbhsuz.top
socal-labworx.com
arethaglennevents.com
rafiqsiregar.com
esgh2.com
veirdmusic.com
abzcc.xyz
8065yp.com
dronebazar.com
duetpbr.com
apartamentoslaencantada.com
digigold.info
homedecorsuppliers.com
duenorthrm.com
xmmdsy.com
ddstennessee.com
marmeluz.com
ragnallhess.com
methinelli.com
randomlymetheseer.com
magicgrowthproducts.com
shreejistudio.com
mattress-37684.com
yellyfishfilms.com
www1111cpw.com
tigermedlagroup.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2672-93-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2420-96-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 2716 isab.pif -
Loads dropped DLL 4 IoCs
pid Process 2536 jestyyfre44321.exe 2536 jestyyfre44321.exe 2536 jestyyfre44321.exe 2536 jestyyfre44321.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2716 set thread context of 2672 2716 isab.pif 32 PID 2672 set thread context of 1128 2672 RegSvcs.exe 20 PID 2420 set thread context of 1128 2420 wininit.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jestyyfre44321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isab.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2672 RegSvcs.exe 2672 RegSvcs.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe 2420 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2672 RegSvcs.exe 2672 RegSvcs.exe 2672 RegSvcs.exe 2420 wininit.exe 2420 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2672 RegSvcs.exe Token: SeDebugPrivilege 2420 wininit.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2716 2536 jestyyfre44321.exe 30 PID 2536 wrote to memory of 2716 2536 jestyyfre44321.exe 30 PID 2536 wrote to memory of 2716 2536 jestyyfre44321.exe 30 PID 2536 wrote to memory of 2716 2536 jestyyfre44321.exe 30 PID 2536 wrote to memory of 2716 2536 jestyyfre44321.exe 30 PID 2536 wrote to memory of 2716 2536 jestyyfre44321.exe 30 PID 2536 wrote to memory of 2716 2536 jestyyfre44321.exe 30 PID 2716 wrote to memory of 2644 2716 isab.pif 31 PID 2716 wrote to memory of 2644 2716 isab.pif 31 PID 2716 wrote to memory of 2644 2716 isab.pif 31 PID 2716 wrote to memory of 2644 2716 isab.pif 31 PID 2716 wrote to memory of 2644 2716 isab.pif 31 PID 2716 wrote to memory of 2644 2716 isab.pif 31 PID 2716 wrote to memory of 2644 2716 isab.pif 31 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 2716 wrote to memory of 2672 2716 isab.pif 32 PID 1128 wrote to memory of 2420 1128 Explorer.EXE 33 PID 1128 wrote to memory of 2420 1128 Explorer.EXE 33 PID 1128 wrote to memory of 2420 1128 Explorer.EXE 33 PID 1128 wrote to memory of 2420 1128 Explorer.EXE 33 PID 2420 wrote to memory of 2364 2420 wininit.exe 35 PID 2420 wrote to memory of 2364 2420 wininit.exe 35 PID 2420 wrote to memory of 2364 2420 wininit.exe 35 PID 2420 wrote to memory of 2364 2420 wininit.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\jestyyfre44321.exe"C:\Users\Admin\AppData\Local\Temp\jestyyfre44321.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\9_53\isab.pif"C:\Users\Admin\9_53\isab.pif" telx.ogt3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:2644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5c54a5a90e3803c572ed12150b510f97d
SHA18e2f02b84fd5f6e873cf51d343fb96a531a45e45
SHA25687cd75d6b1a5607b39e5940d9021ca9281c3d47217e597e0601f6f6d02b06bf8
SHA512d8f5395fde12d62e94e7969b7d298f03733c56adf3139de5a6167a59c497152c384631d6da12380136b00d10119a7fdec4a53208f5152c578a71b589b8f9e776
-
Filesize
370KB
MD5d40060faa63c30e509e8f6c5be0dcdc4
SHA14ec1022751784dc6b2a8819e6d4b860d6b38d82f
SHA25615994b50140988529c4b8c18aebabcb60fedc34b45dfdac906569bda318f3414
SHA5121761c72937b4476c666ffb93b96bb94427068dae217fe03c021082e5a988a09e3dacfd306b6440ca90de3ce48afa2aeb85829a1e76f3ff2fc2e636180f0eb1da
-
Filesize
820KB
MD50c996fa7285452f1302d8c781bd72972
SHA193b2a1bce155afec134804b3a2ef6b40ac0a4178
SHA256470588c09deb416b91666b21a15cda3fd2e8807bdf83e27e5939415651bb006f
SHA512e8d8c61f04707af05143e1c68ffcbf38a433766096a5c87c0f6b2b8cf54f0f2d4a60e39f4b0fb5a78dfbb97a2549d7c930887021bf513abf268a4677d9231c5e