Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
IFETESTEY.scr
Resource
win7-20241010-en
General
-
Target
IFETESTEY.scr
-
Size
821KB
-
MD5
5c65b19c1209c454e3da03f65c50baca
-
SHA1
6b4520a5cb2be3bca572570bfce5245463883054
-
SHA256
78baa36f2d7dc4a5461fbe4fa0829151bb84361047d4d3cf4adad84308177afd
-
SHA512
079c3e95c46dff54ec137cb538bb825e74f19ba2505098cfedd85d08fe1c0b0d87d86740de86b47fd80c1df01e4a030046b4904d7ee5b44f273ad8fb82f8f383
-
SSDEEP
24576:ACxhKzCg1vDBKufvyB9hslVsFrD1DxkDQw1:IzNDguHyBTslVsf1kDQg
Malware Config
Extracted
formbook
4.1
awqu
soltwin24horas.com
kaiget.com
majalahlangitan.com
preventable.top
caronandtom.com
2222k06.com
hdrezkart54ff.net
supermessage.xyz
dezeenb.com
bestatakes.xyz
californiasportsbar.com
hxg66.xyz
localxgirl.online
educ-ability.com
b2breferralshop.online
miamicollisioncenter.com
bjcxqcdb.com
barrineauparkbees.com
robotics6.com
web-bastler.com
jupiterchb.com
fuzzcloud.space
fin-clean.com
tudodebeleza.com
7msnpredazzite.sbs
zuvesite.site
apipain.com
w388-winnn.online
ibedes.com
dating4lonely.com
tomsshoesonsale.com
burakugan.com
camilalopez.online
mabghsjkshop.com
paulinemoroneyevents.com
medicalsurgeryprocedures-d.site
clintonfabian.com
chesapeakehi.com
tabgrabber.com
luckersgoldsurvey.top
fasciasupplements.com
wanzhoukaoyu520.com
3919m.com
froehlichbuilder.net
kendallsescorts.com
holywingz.online
richardvenner.com
yx5589.com
sodephoangnam.com
lucasdogrupo.store
cgambill.com
lehrent.com
vtc-capital.ltd
skyxproductions.com
manuelgutierrez.online
ashlyanddustin.com
hg59090.com
notsite.site
ainuer.com
convivialonlineconsulting.site
allcrickad.xyz
bp5cw.beauty
ladiosa.store
ovzdutsxshop.com
wolacannabis.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2340-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2340-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2624-26-0x00000000000A0000-0x00000000000CF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2336 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2880 set thread context of 2340 2880 IFETESTEY.scr 30 PID 2340 set thread context of 1352 2340 IFETESTEY.scr 21 PID 2624 set thread context of 1352 2624 wininit.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IFETESTEY.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2340 IFETESTEY.scr 2340 IFETESTEY.scr 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe 2624 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2340 IFETESTEY.scr 2340 IFETESTEY.scr 2340 IFETESTEY.scr 2624 wininit.exe 2624 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2340 IFETESTEY.scr Token: SeDebugPrivilege 2624 wininit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2340 2880 IFETESTEY.scr 30 PID 2880 wrote to memory of 2340 2880 IFETESTEY.scr 30 PID 2880 wrote to memory of 2340 2880 IFETESTEY.scr 30 PID 2880 wrote to memory of 2340 2880 IFETESTEY.scr 30 PID 2880 wrote to memory of 2340 2880 IFETESTEY.scr 30 PID 2880 wrote to memory of 2340 2880 IFETESTEY.scr 30 PID 2880 wrote to memory of 2340 2880 IFETESTEY.scr 30 PID 1352 wrote to memory of 2624 1352 Explorer.EXE 31 PID 1352 wrote to memory of 2624 1352 Explorer.EXE 31 PID 1352 wrote to memory of 2624 1352 Explorer.EXE 31 PID 1352 wrote to memory of 2624 1352 Explorer.EXE 31 PID 2624 wrote to memory of 2336 2624 wininit.exe 32 PID 2624 wrote to memory of 2336 2624 wininit.exe 32 PID 2624 wrote to memory of 2336 2624 wininit.exe 32 PID 2624 wrote to memory of 2336 2624 wininit.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr" /S2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2336
-
-