Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
Request for quotation- Enquiry No55.exe
Resource
win7-20240903-en
General
-
Target
Request for quotation- Enquiry No55.exe
-
Size
696KB
-
MD5
fc9af02d076b78651a901d8fdec5a0f9
-
SHA1
aba47907f5717185cb4caf13aa5e7a4ca2bf003e
-
SHA256
e6d2c97461c6aac9ea130eaa96f9927b57998c04b5e7573a555caa729178a70c
-
SHA512
4b202232e9a127d31cc56e47b01f43c0a4925b2da62a33fcdac7c23daecd85d82af33bce391f2dbaf5b847271d9c5ecd7ec6602575d39946ad61c6027d8bf6b8
-
SSDEEP
12288:7Ke0fsk2iNwRL1ROZ+NU/SbJKT1hxhH3c4STBmZNvAjAGM6Dn5pDbXteGm6t:74F1Su+ewJixoTBmZAK6Dn3nm
Malware Config
Extracted
formbook
4.1
pna
responsibleson.com
crown-friendly.info
cyberwastemanagement.com
broncoscards.com
artwithjessica.com
present-motherhood.com
alarmaantiokupacion.com
bluecollarjim.com
sneguard.com
digitalsept.com
terrycareerconsulting.com
watch-lover.site
funkytees.kiwi
xn--f1adbavc.online
hitchlove.com
elmejorsetup.com
koc14338.com
obruchalnye-kolca.com
zambezia-promo.info
mataangin.net
orgefy.com
sonajhuri.com
runmesport.com
edxar.xyz
healthy-time.info
vade.photography
alon-mail.com
healthpassportkenya.com
kuaiyibaozhuang.com
ssslagrandred.com
kwalie.com
miamitammycakes.com
pqggl.com
analogmediaempire.com
coyaneducation.com
kidsbritanica.com
jaliis.com
notarylightintransit.com
klinikpsikologgultenyildiz.com
tao1hui.com
georgiairwincoaching.com
needsatdoor.com
hotelcastillito.com
locallygrownmedia.com
elmmgmt.com
crispypitbikes.com
abilityi.com
breadultimatetalk.com
fitnessmantis.com
wenche8.com
columbiariverweddings.com
sharpinion.com
videosdownloader.world
flanco.agency
universopedia.com
mnrzyhlmu.icu
yorkshiremotorcycles.com
vriker.com
konstrukt-planung.com
connectmybitcoin.com
brologan.com
asisee.photos
kidsmagic.online
margotalexis.com
dagadia.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2156-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2156-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4760 set thread context of 2156 4760 Request for quotation- Enquiry No55.exe 98 PID 2156 set thread context of 3512 2156 Request for quotation- Enquiry No55.exe 56 PID 4232 set thread context of 3512 4232 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request for quotation- Enquiry No55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2156 Request for quotation- Enquiry No55.exe 2156 Request for quotation- Enquiry No55.exe 2156 Request for quotation- Enquiry No55.exe 2156 Request for quotation- Enquiry No55.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe 4232 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2156 Request for quotation- Enquiry No55.exe 2156 Request for quotation- Enquiry No55.exe 2156 Request for quotation- Enquiry No55.exe 4232 help.exe 4232 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 Request for quotation- Enquiry No55.exe Token: SeDebugPrivilege 4232 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2156 4760 Request for quotation- Enquiry No55.exe 98 PID 4760 wrote to memory of 2156 4760 Request for quotation- Enquiry No55.exe 98 PID 4760 wrote to memory of 2156 4760 Request for quotation- Enquiry No55.exe 98 PID 4760 wrote to memory of 2156 4760 Request for quotation- Enquiry No55.exe 98 PID 4760 wrote to memory of 2156 4760 Request for quotation- Enquiry No55.exe 98 PID 4760 wrote to memory of 2156 4760 Request for quotation- Enquiry No55.exe 98 PID 3512 wrote to memory of 4232 3512 Explorer.EXE 99 PID 3512 wrote to memory of 4232 3512 Explorer.EXE 99 PID 3512 wrote to memory of 4232 3512 Explorer.EXE 99 PID 4232 wrote to memory of 4492 4232 help.exe 100 PID 4232 wrote to memory of 4492 4232 help.exe 100 PID 4232 wrote to memory of 4492 4232 help.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-