Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
IFETESTEY.scr
Resource
win7-20241010-en
General
-
Target
IFETESTEY.scr
-
Size
821KB
-
MD5
5c65b19c1209c454e3da03f65c50baca
-
SHA1
6b4520a5cb2be3bca572570bfce5245463883054
-
SHA256
78baa36f2d7dc4a5461fbe4fa0829151bb84361047d4d3cf4adad84308177afd
-
SHA512
079c3e95c46dff54ec137cb538bb825e74f19ba2505098cfedd85d08fe1c0b0d87d86740de86b47fd80c1df01e4a030046b4904d7ee5b44f273ad8fb82f8f383
-
SSDEEP
24576:ACxhKzCg1vDBKufvyB9hslVsFrD1DxkDQw1:IzNDguHyBTslVsf1kDQg
Malware Config
Extracted
formbook
4.1
awqu
soltwin24horas.com
kaiget.com
majalahlangitan.com
preventable.top
caronandtom.com
2222k06.com
hdrezkart54ff.net
supermessage.xyz
dezeenb.com
bestatakes.xyz
californiasportsbar.com
hxg66.xyz
localxgirl.online
educ-ability.com
b2breferralshop.online
miamicollisioncenter.com
bjcxqcdb.com
barrineauparkbees.com
robotics6.com
web-bastler.com
jupiterchb.com
fuzzcloud.space
fin-clean.com
tudodebeleza.com
7msnpredazzite.sbs
zuvesite.site
apipain.com
w388-winnn.online
ibedes.com
dating4lonely.com
tomsshoesonsale.com
burakugan.com
camilalopez.online
mabghsjkshop.com
paulinemoroneyevents.com
medicalsurgeryprocedures-d.site
clintonfabian.com
chesapeakehi.com
tabgrabber.com
luckersgoldsurvey.top
fasciasupplements.com
wanzhoukaoyu520.com
3919m.com
froehlichbuilder.net
kendallsescorts.com
holywingz.online
richardvenner.com
yx5589.com
sodephoangnam.com
lucasdogrupo.store
cgambill.com
lehrent.com
vtc-capital.ltd
skyxproductions.com
manuelgutierrez.online
ashlyanddustin.com
hg59090.com
notsite.site
ainuer.com
convivialonlineconsulting.site
allcrickad.xyz
bp5cw.beauty
ladiosa.store
ovzdutsxshop.com
wolacannabis.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4988-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4988-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5064-23-0x0000000000A90000-0x0000000000ABF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3724 set thread context of 4988 3724 IFETESTEY.scr 91 PID 4988 set thread context of 3396 4988 IFETESTEY.scr 56 PID 5064 set thread context of 3396 5064 control.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IFETESTEY.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4988 IFETESTEY.scr 4988 IFETESTEY.scr 4988 IFETESTEY.scr 4988 IFETESTEY.scr 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe 5064 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4988 IFETESTEY.scr 4988 IFETESTEY.scr 4988 IFETESTEY.scr 5064 control.exe 5064 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4988 IFETESTEY.scr Token: SeDebugPrivilege 5064 control.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3724 wrote to memory of 4988 3724 IFETESTEY.scr 91 PID 3724 wrote to memory of 4988 3724 IFETESTEY.scr 91 PID 3724 wrote to memory of 4988 3724 IFETESTEY.scr 91 PID 3724 wrote to memory of 4988 3724 IFETESTEY.scr 91 PID 3724 wrote to memory of 4988 3724 IFETESTEY.scr 91 PID 3724 wrote to memory of 4988 3724 IFETESTEY.scr 91 PID 3396 wrote to memory of 5064 3396 Explorer.EXE 92 PID 3396 wrote to memory of 5064 3396 Explorer.EXE 92 PID 3396 wrote to memory of 5064 3396 Explorer.EXE 92 PID 5064 wrote to memory of 3632 5064 control.exe 93 PID 5064 wrote to memory of 3632 5064 control.exe 93 PID 5064 wrote to memory of 3632 5064 control.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr" /S2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IFETESTEY.scr"3⤵
- System Location Discovery: System Language Discovery
PID:3632
-
-