Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-56566666.exe
Resource
win7-20241010-en
General
-
Target
RFQ-56566666.exe
-
Size
301KB
-
MD5
5715ba8843db8b546c7b02c4779f0da5
-
SHA1
f4829f717b13ccad4bb5522f6bec19b8a6542556
-
SHA256
6932485133a755307c9a47908b52a34a7bbf5748564477b1e40ae4ef3d8b484c
-
SHA512
568a99807055746769e9a7f2a1b6951aacb2a845b562600b25f69367ca0c216c4c7112931aabeaceb8bfea46bec4cdbf6ef4e1586c2301896d3476889f27cb58
-
SSDEEP
6144:zqOiKE8RZK5rwXROf4GPR1L5+8hDiNf533mVk+s48L1A:NRZK5KOfb5Xben8Zs48L1A
Malware Config
Extracted
formbook
4.1
u2s7
mixso.site
rlagnin.com
imini.top
grapejulius.com
pkcomputer.online
surepolka.com
petahansen.com
rodriguezlawncare.net
oscartheelearning.ninja
gcubaang.top
learnserver.site
weddinginthehamptons.com
doctorverma.online
epicsx.com
signmole.shop
storetrade.store
htlenderschampionship.com
tigerexch-official.net
momentum6labs.com
safetyconsultants.sydney
sala-han.xyz
getafdarager.com
boleps.com
controng.click
xuvomei.fun
antoniomx.online
xn--otu08ib2x.xn--io0a7i
tryvirtusinc.com
lexorlift.store
mrnobodyfitness.com
trishshah.realtor
wildwave.net
reyhanlitonerservisi.xyz
buyglasssoftware.com
brightsidewealthplanning.com
digaojiuzhou.live
global-life.one
memeguardeth.com
maxchristianfarrugia.com
formulapremium.online
laponia.shop
nxqdl.shop
omokeni.com
jhuipalj.work
tequilaelgordo.com
betomarques.com
tzbr1h.info
mirtl.xyz
sg-jewelers.com
hoktoto.asia
gcmpodrych.pro
usfpgl9x9d.com
permatecture.info
kimcloutier.online
badectin.xyz
firsttcehfed.cam
servicecoin.site
extremeovenclean.com
marketing-agency.pro
romanycmusic.com
xn--h1afefqv.xn--p1acf
xn--mller-jua.legal
timbobanic.net
areyoumarketingtome.website
erljhonmelano.monster
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/3064-8-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3064-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2904-18-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2808 set thread context of 3064 2808 RFQ-56566666.exe 30 PID 3064 set thread context of 1212 3064 aspnet_compiler.exe 21 PID 2904 set thread context of 1212 2904 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-56566666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3692679935-4019334568-335155002-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3064 aspnet_compiler.exe 3064 aspnet_compiler.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3064 aspnet_compiler.exe 3064 aspnet_compiler.exe 3064 aspnet_compiler.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe 2904 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3064 aspnet_compiler.exe Token: SeDebugPrivilege 2904 cmstp.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3064 2808 RFQ-56566666.exe 30 PID 2808 wrote to memory of 3064 2808 RFQ-56566666.exe 30 PID 2808 wrote to memory of 3064 2808 RFQ-56566666.exe 30 PID 2808 wrote to memory of 3064 2808 RFQ-56566666.exe 30 PID 2808 wrote to memory of 3064 2808 RFQ-56566666.exe 30 PID 2808 wrote to memory of 3064 2808 RFQ-56566666.exe 30 PID 2808 wrote to memory of 3064 2808 RFQ-56566666.exe 30 PID 1212 wrote to memory of 2904 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2904 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2904 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2904 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2904 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2904 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2904 1212 Explorer.EXE 31 PID 2904 wrote to memory of 2076 2904 cmstp.exe 32 PID 2904 wrote to memory of 2076 2904 cmstp.exe 32 PID 2904 wrote to memory of 2076 2904 cmstp.exe 32 PID 2904 wrote to memory of 2076 2904 cmstp.exe 32 PID 2904 wrote to memory of 2076 2904 cmstp.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\RFQ-56566666.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-56566666.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2076
-
-