Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
PO__63537353636___IME JPEG.exe
Resource
win7-20241023-en
General
-
Target
PO__63537353636___IME JPEG.exe
-
Size
247KB
-
MD5
ea63eb54dfdd8f74262614563048a01b
-
SHA1
7ea1cc47710b4c399fac4cb9152b42fed5ec7f59
-
SHA256
3ffe776b0fc18193afce55f3502e1c895f7a10d3b01604f9953a1beb72be97fc
-
SHA512
acd89deb5f8d3299c5801f67149bb5bb70a6388c9939d1bb1fb4bd3aeda5704afc9b85db7b2d993f59e14340ea74339f7d806f1ae885db3745aef2a5a9c4b5a2
-
SSDEEP
6144:DQuqHcCDhh++6Cn6lun/ur4oCXQk4OvbqRK7P0+Ar7:kBHcCDhY1CGu/E4oCXQmzqRa0+s7
Malware Config
Extracted
formbook
4.1
u2s7
mixso.site
rlagnin.com
imini.top
grapejulius.com
pkcomputer.online
surepolka.com
petahansen.com
rodriguezlawncare.net
oscartheelearning.ninja
gcubaang.top
learnserver.site
weddinginthehamptons.com
doctorverma.online
epicsx.com
signmole.shop
storetrade.store
htlenderschampionship.com
tigerexch-official.net
momentum6labs.com
safetyconsultants.sydney
sala-han.xyz
getafdarager.com
boleps.com
controng.click
xuvomei.fun
antoniomx.online
xn--otu08ib2x.xn--io0a7i
tryvirtusinc.com
lexorlift.store
mrnobodyfitness.com
trishshah.realtor
wildwave.net
reyhanlitonerservisi.xyz
buyglasssoftware.com
brightsidewealthplanning.com
digaojiuzhou.live
global-life.one
memeguardeth.com
maxchristianfarrugia.com
formulapremium.online
laponia.shop
nxqdl.shop
omokeni.com
jhuipalj.work
tequilaelgordo.com
betomarques.com
tzbr1h.info
mirtl.xyz
sg-jewelers.com
hoktoto.asia
gcmpodrych.pro
usfpgl9x9d.com
permatecture.info
kimcloutier.online
badectin.xyz
firsttcehfed.cam
servicecoin.site
extremeovenclean.com
marketing-agency.pro
romanycmusic.com
xn--h1afefqv.xn--p1acf
xn--mller-jua.legal
timbobanic.net
areyoumarketingtome.website
erljhonmelano.monster
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2760-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2760-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2668-21-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2844 set thread context of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2760 set thread context of 1248 2760 Regsvcs.exe 21 PID 2668 set thread context of 1248 2668 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO__63537353636___IME JPEG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1163522206-1469769407-485553996-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wscript.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2760 Regsvcs.exe 2760 Regsvcs.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2760 Regsvcs.exe 2760 Regsvcs.exe 2760 Regsvcs.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe 2668 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2760 Regsvcs.exe Token: SeDebugPrivilege 2668 wscript.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 2844 wrote to memory of 2760 2844 PO__63537353636___IME JPEG.exe 30 PID 1248 wrote to memory of 2668 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2668 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2668 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2668 1248 Explorer.EXE 31 PID 2668 wrote to memory of 1616 2668 wscript.exe 32 PID 2668 wrote to memory of 1616 2668 wscript.exe 32 PID 2668 wrote to memory of 1616 2668 wscript.exe 32 PID 2668 wrote to memory of 1616 2668 wscript.exe 32 PID 2668 wrote to memory of 1616 2668 wscript.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\PO__63537353636___IME JPEG.exe"C:\Users\Admin\AppData\Local\Temp\PO__63537353636___IME JPEG.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1616
-
-