Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
19.10.2022-21.10.2022 Ekstre.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19.10.2022-21.10.2022 Ekstre.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
oujsjnpvzn.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
oujsjnpvzn.exe
Resource
win10v2004-20241007-en
General
-
Target
oujsjnpvzn.exe
-
Size
58KB
-
MD5
a53bf35dd3f2a0ece1babdf99d98ddb7
-
SHA1
866e4d1315486d4f792e03449def24bf48fba2f5
-
SHA256
f27f1c46335ed31550b8fd38781e85fd498edaf77ffc7fdea7b32f044c5cc26d
-
SHA512
f0ea778f032871260b891116e880c1814a7eeb512b4f649c8a3d355109aed9858128477a8d2c1d12dac5ace5be74879dfd590b9959c309ce67d1879828f679f2
-
SSDEEP
1536:s1ep1tOKxVeU01JVlG9NSstFdGxveJh7LY0GRRxfW:s10tOKinJlwN2ypGR/fW
Malware Config
Extracted
formbook
4.1
oy10
wzwanju.com
vaultnutrition.info
propane-gallon.site
balkanmetin2.com
costa-del-sol.email
kayodeokikiolu.com
singlesshirts.com
nearestfoods.com
trenddetail.com
yihaimaidan.net
dfdr3r.site
tuitionmatters.co.uk
benglas.online
coloraja.xyz
tianzicheng.com
lamkt.com
dileca.com
6698856.com
vishi.store
ablehair.com
superios.life
jsmultimedia.com
deadstone.store
specialtyhall.com
jurongchuan.top
kitchenservice.xyz
thediverseinvestor.com
081206.com
willdevphotography.co.uk
betsportsvt.com
nariaex.com
hronestop.net
allsecurityhub.com
altamira.info
mkba.store
packmidias.site
shunft.xyz
alison-winter.com
under-storey.co.uk
jet-india.com
chinagq.net
taprotek.online
spedizionepacchi.com
flowscreedsmanchester.online
chovaytiengop.info
91508.uk
safe365.cloud
flightrepay.co.uk
jokamet.info
asesoriaalicante.pro
hqxr2019.com
alastar.online
automatemyproperty.com
loyaltyovermoneyllc.biz
asperity.sbs
empiron.online
oojaaa.com
daileyduo.com
sxtarena.com
anpost.life
acquybuuphat.com
rautarasti.info
bigboss-digital.com
i-signal.info
rallingslaw.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral3/memory/2888-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2736-10-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2372 set thread context of 2888 2372 oujsjnpvzn.exe 31 PID 2888 set thread context of 1196 2888 oujsjnpvzn.exe 21 PID 2736 set thread context of 1196 2736 NAPSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oujsjnpvzn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2888 oujsjnpvzn.exe 2888 oujsjnpvzn.exe 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2888 oujsjnpvzn.exe 2888 oujsjnpvzn.exe 2888 oujsjnpvzn.exe 2736 NAPSTAT.EXE 2736 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2888 oujsjnpvzn.exe Token: SeDebugPrivilege 2736 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2888 2372 oujsjnpvzn.exe 31 PID 2372 wrote to memory of 2888 2372 oujsjnpvzn.exe 31 PID 2372 wrote to memory of 2888 2372 oujsjnpvzn.exe 31 PID 2372 wrote to memory of 2888 2372 oujsjnpvzn.exe 31 PID 2372 wrote to memory of 2888 2372 oujsjnpvzn.exe 31 PID 1196 wrote to memory of 2736 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2736 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2736 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2736 1196 Explorer.EXE 32 PID 2736 wrote to memory of 2800 2736 NAPSTAT.EXE 33 PID 2736 wrote to memory of 2800 2736 NAPSTAT.EXE 33 PID 2736 wrote to memory of 2800 2736 NAPSTAT.EXE 33 PID 2736 wrote to memory of 2800 2736 NAPSTAT.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\oujsjnpvzn.exe"C:\Users\Admin\AppData\Local\Temp\oujsjnpvzn.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\oujsjnpvzn.exe"C:\Users\Admin\AppData\Local\Temp\oujsjnpvzn.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\oujsjnpvzn.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2800
-
-