Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20240903-en
General
-
Target
PO.exe
-
Size
550KB
-
MD5
8a5940fa28ca1b3b684ca60d704fef82
-
SHA1
dd71435f24a40087de7c69d636891bda2a426459
-
SHA256
5f688c2a0311c1627e8adc2ed5bdf82dd9bef167cf6bb90de7cbc53c2e3c4052
-
SHA512
5e52ba0e4ddfde851d598ff60d16f10396c68ee603200eed9580f3b54d3ef553f9c695f09ec917e0bec35deb832fdc66d6abc8a1bbb4536adad695f2c7f6d730
-
SSDEEP
12288:Dth6kROZz/jHEG4eD2h0LKfyuqzYdaECH/OmApVQ:Bh6VzbSeioUyuAYgfRAs
Malware Config
Extracted
formbook
4.1
tw7
prestige-reps.com
nhakhoaquoctesmile.com
sicumplex.com
in36972.com
hikoosbyheidi.com
rayinthecity.com
mjwestwoodphotography.com
radiopeek.com
attisit.com
hdcpos.com
xn--halise-1ua.com
bossroyale.com
blstd.com
wniversitet.com
bethumb.pro
romber.info
bergundy.com
kingscoop.com
antiquefactory.net
loiseaudejade.com
amgomedia.com
njdatian.com
excelfc.com
kosmetik-junkie.com
hpdankai.com
fitnessient.com
ohiocopywriter.com
natalia4carpinteriacouncil.com
mtkmusic.com
esl-ca.com
adventuredomewyo.com
thedharmaoflife.com
tikkastreet.com
thecalmkoala.com
ghienmall.com
aeguana.systems
ajengofun.com
swagggnenterprise.com
demolishblackmagic.com
bootleggerstrail.net
trungnguyen.company
boekhouderdestelbergen.com
supremegeneticsnursery.com
lalitradelines.com
wuerzmische.com
junk-service.com
everycases.net
priyaitaliya.com
wordofmouthhub.info
linuxmemes.com
veganfoodinlondon.com
testeinrichten.one
bancapmang.com
likesonyc.com
corpolesebakery.com
justtherapies.com
stranded.network
royalvictoryservices.com
danablueboutique.com
nichirenreader.com
ytjhcb.com
michaelmcmanusenergy.com
dyjsxs.com
tbporiginals.com
skybowls.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3168-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3168-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3168-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1608 set thread context of 3168 1608 PO.exe 102 PID 3168 set thread context of 3404 3168 PO.exe 56 PID 3168 set thread context of 3404 3168 PO.exe 56 PID 1952 set thread context of 3404 1952 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1608 PO.exe 1608 PO.exe 3168 PO.exe 3168 PO.exe 3168 PO.exe 3168 PO.exe 3168 PO.exe 3168 PO.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe 1952 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3168 PO.exe 3168 PO.exe 3168 PO.exe 3168 PO.exe 1952 wscript.exe 1952 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1608 PO.exe Token: SeDebugPrivilege 3168 PO.exe Token: SeDebugPrivilege 1952 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2960 1608 PO.exe 101 PID 1608 wrote to memory of 2960 1608 PO.exe 101 PID 1608 wrote to memory of 2960 1608 PO.exe 101 PID 1608 wrote to memory of 3168 1608 PO.exe 102 PID 1608 wrote to memory of 3168 1608 PO.exe 102 PID 1608 wrote to memory of 3168 1608 PO.exe 102 PID 1608 wrote to memory of 3168 1608 PO.exe 102 PID 1608 wrote to memory of 3168 1608 PO.exe 102 PID 1608 wrote to memory of 3168 1608 PO.exe 102 PID 3404 wrote to memory of 1952 3404 Explorer.EXE 103 PID 3404 wrote to memory of 1952 3404 Explorer.EXE 103 PID 3404 wrote to memory of 1952 3404 Explorer.EXE 103 PID 1952 wrote to memory of 4924 1952 wscript.exe 104 PID 1952 wrote to memory of 4924 1952 wscript.exe 104 PID 1952 wrote to memory of 4924 1952 wscript.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"3⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4924
-
-