Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
scrss.exe
Resource
win7-20241010-en
General
-
Target
scrss.exe
-
Size
2.1MB
-
MD5
13a0b0388851bb224b5a71b9ad3bad48
-
SHA1
297372dc285474cf8f587c0673ff5638c982e4f0
-
SHA256
b062a9d743bcc3af9728b50385318d53924a65ad2defffae0ff625b6300280d1
-
SHA512
c235917d46d9c5c7ea4af374966eb98151ec753711f620af3295b3ec9ccf835f2946deede7fd5c7a68d2b2b13829f21fb2646aca1be399a7de1c78416aee8290
-
SSDEEP
24576:GM5ixeMI2troHK6vQssZJ/BeVIdB4Eg54uZG9q8QKXxOLXxDTUHVM38Q:B5yeMISavQs8peV6JQuM/zxaVM/
Malware Config
Extracted
formbook
4.1
s0s2
stripe-forecast.com
perfectingnextstage.com
primarole.com
nonnydesigns.com
wordsofweightandlevity.com
mafleursam.com
hardwarepicker.tech
minex-intl.com
thenextbigtech.net
rabeproject.com
sticktogracestudio.com
releve.space
readoku.net
carings.net
nasdaq-ex.store
au-techng.com
thethoughtgenius.com
how-to-learn-languages.net
kitabisabelanja.com
awndka.xyz
bretholdings.com
boscue.com
titantechmail.com
jadacomercializadora.com
shirtgse.online
derechoromano.com
yatirimtamam.com
gektolicompany.xyz
skyglowtech.com
67f5ead1a275.info
emnopgroup.com
lermontov.online
roshmary.com
goodandperfectgift.com
landliner.taxi
bhui7.com
barq-id.com
thevirtualcafe.net
176bwcx.com
zorbaplus.com
zzbb8899.xyz
magictvshow.com
serengetifadhions.com
ryzcn.com
amsordglobal.com
biznes-poznan24.xyz
globalepic10x.com
carrotshelter.com
keiwaseitai.online
energyecuador.net
kinsgtonbrass.com
cankaoao.com
mybullion.net
zjzcmy.net
businedstrack.com
mayipaimai.com
minijob-duesseldorf.net
gcpropolis.com
liwoo.top
glitzye.com
doca29.site
joselynbaezs.com
purchase614210.com
wojiayouxuan.com
dailycuatudong.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2752-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2752-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1940-22-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2268 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2344 set thread context of 2752 2344 scrss.exe 30 PID 2752 set thread context of 1204 2752 scrss.exe 21 PID 1940 set thread context of 1204 1940 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2344 scrss.exe 2752 scrss.exe 2752 scrss.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe 1940 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2752 scrss.exe 2752 scrss.exe 2752 scrss.exe 1940 cmstp.exe 1940 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2344 scrss.exe Token: SeDebugPrivilege 2752 scrss.exe Token: SeDebugPrivilege 1940 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2752 2344 scrss.exe 30 PID 2344 wrote to memory of 2752 2344 scrss.exe 30 PID 2344 wrote to memory of 2752 2344 scrss.exe 30 PID 2344 wrote to memory of 2752 2344 scrss.exe 30 PID 2344 wrote to memory of 2752 2344 scrss.exe 30 PID 2344 wrote to memory of 2752 2344 scrss.exe 30 PID 2344 wrote to memory of 2752 2344 scrss.exe 30 PID 1204 wrote to memory of 1940 1204 Explorer.EXE 32 PID 1204 wrote to memory of 1940 1204 Explorer.EXE 32 PID 1204 wrote to memory of 1940 1204 Explorer.EXE 32 PID 1204 wrote to memory of 1940 1204 Explorer.EXE 32 PID 1204 wrote to memory of 1940 1204 Explorer.EXE 32 PID 1204 wrote to memory of 1940 1204 Explorer.EXE 32 PID 1204 wrote to memory of 1940 1204 Explorer.EXE 32 PID 1940 wrote to memory of 2268 1940 cmstp.exe 33 PID 1940 wrote to memory of 2268 1940 cmstp.exe 33 PID 1940 wrote to memory of 2268 1940 cmstp.exe 33 PID 1940 wrote to memory of 2268 1940 cmstp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\scrss.exe"C:\Users\Admin\AppData\Local\Temp\scrss.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\scrss.exe"C:\Users\Admin\AppData\Local\Temp\scrss.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:956
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\scrss.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2268
-
-