Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20240903-en
General
-
Target
PO.exe
-
Size
550KB
-
MD5
8a5940fa28ca1b3b684ca60d704fef82
-
SHA1
dd71435f24a40087de7c69d636891bda2a426459
-
SHA256
5f688c2a0311c1627e8adc2ed5bdf82dd9bef167cf6bb90de7cbc53c2e3c4052
-
SHA512
5e52ba0e4ddfde851d598ff60d16f10396c68ee603200eed9580f3b54d3ef553f9c695f09ec917e0bec35deb832fdc66d6abc8a1bbb4536adad695f2c7f6d730
-
SSDEEP
12288:Dth6kROZz/jHEG4eD2h0LKfyuqzYdaECH/OmApVQ:Bh6VzbSeioUyuAYgfRAs
Malware Config
Extracted
formbook
4.1
tw7
prestige-reps.com
nhakhoaquoctesmile.com
sicumplex.com
in36972.com
hikoosbyheidi.com
rayinthecity.com
mjwestwoodphotography.com
radiopeek.com
attisit.com
hdcpos.com
xn--halise-1ua.com
bossroyale.com
blstd.com
wniversitet.com
bethumb.pro
romber.info
bergundy.com
kingscoop.com
antiquefactory.net
loiseaudejade.com
amgomedia.com
njdatian.com
excelfc.com
kosmetik-junkie.com
hpdankai.com
fitnessient.com
ohiocopywriter.com
natalia4carpinteriacouncil.com
mtkmusic.com
esl-ca.com
adventuredomewyo.com
thedharmaoflife.com
tikkastreet.com
thecalmkoala.com
ghienmall.com
aeguana.systems
ajengofun.com
swagggnenterprise.com
demolishblackmagic.com
bootleggerstrail.net
trungnguyen.company
boekhouderdestelbergen.com
supremegeneticsnursery.com
lalitradelines.com
wuerzmische.com
junk-service.com
everycases.net
priyaitaliya.com
wordofmouthhub.info
linuxmemes.com
veganfoodinlondon.com
testeinrichten.one
bancapmang.com
likesonyc.com
corpolesebakery.com
justtherapies.com
stranded.network
royalvictoryservices.com
danablueboutique.com
nichirenreader.com
ytjhcb.com
michaelmcmanusenergy.com
dyjsxs.com
tbporiginals.com
skybowls.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2692-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2692-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2692-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2308 set thread context of 2692 2308 PO.exe 31 PID 2692 set thread context of 1192 2692 PO.exe 21 PID 2692 set thread context of 1192 2692 PO.exe 21 PID 2488 set thread context of 1192 2488 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2692 PO.exe 2692 PO.exe 2692 PO.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe 2488 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2692 PO.exe 2692 PO.exe 2692 PO.exe 2692 PO.exe 2488 help.exe 2488 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 PO.exe Token: SeDebugPrivilege 2488 help.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2692 2308 PO.exe 31 PID 2308 wrote to memory of 2692 2308 PO.exe 31 PID 2308 wrote to memory of 2692 2308 PO.exe 31 PID 2308 wrote to memory of 2692 2308 PO.exe 31 PID 2308 wrote to memory of 2692 2308 PO.exe 31 PID 2308 wrote to memory of 2692 2308 PO.exe 31 PID 2308 wrote to memory of 2692 2308 PO.exe 31 PID 2692 wrote to memory of 2488 2692 PO.exe 32 PID 2692 wrote to memory of 2488 2692 PO.exe 32 PID 2692 wrote to memory of 2488 2692 PO.exe 32 PID 2692 wrote to memory of 2488 2692 PO.exe 32 PID 2488 wrote to memory of 2584 2488 help.exe 33 PID 2488 wrote to memory of 2584 2488 help.exe 33 PID 2488 wrote to memory of 2584 2488 help.exe 33 PID 2488 wrote to memory of 2584 2488 help.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
-