Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
zYqJmECKmhz499J.exe
Resource
win7-20241023-en
General
-
Target
zYqJmECKmhz499J.exe
-
Size
1.1MB
-
MD5
54a60fa86dd57e95fc68c25d2d2949a7
-
SHA1
cac7af8b3cdeb3bc61593311f3a6851c82d01a69
-
SHA256
b2bd364a32ee75888d9343bfc3a16b9eb58151fd94b4f3c38890f6ba2256b2e8
-
SHA512
b95cfb7209f92084d0a70126e123d009f5b170a5526eeefcebeae136779952a02a90e4f799b18759ab21fd9c4277234cbba24f0d81b23d183dddebe49d61a692
-
SSDEEP
12288:DJPgbYHTFyemCjEpTx0pchoZ2XjpXV8ME03wBwMfkc14c1L/UxDbX6U55uQIjLmf:XzFyEE2choONl8z0ATfkcacJYjAo
Malware Config
Extracted
formbook
4.1
uegp
firstregaljewellers.com
highgateshop.com
sorialab4.online
kurzneck.com
zonetechservices.com
akibul.net
khukhuanphongkham.com
lovelessneilsen.online
scholarlyresearch-guide.net
jagodda.com
comitivatratando.com
ynqjnx.com
rodarle.xyz
heroesjourneynft.com
weltreise.xyz
enstao.com
istilllmail.com
malayaoudh.com
xsdgia.com
palisadeslodging.com
howfitness.net
agenceweb.space
buildergrp.com
5aomen.com
aytaydecor.com
nnqdzp.com
hljktzl.com
kristinasdnemrozhdeniya.online
technologyprox.com
cultcutz.com
obatakimiko.com
theshaheenos.com
hooyotech.com
fifa.exchange
moftch.com
celinarofer.com
1sttests.com
gdmo112.com
yeswh.ltd
ceruleberth.com
wakuhair.com
jandthebees.com
iwjifw.xyz
careconvoy.xyz
rangerbudies.com
kfcare.com
jitteplusnikibi.xyz
balancebita.com
hypnoticbeauty.net
mcrosfts-update.cloud
bins101.com
migroskadinlarakademisi.com
orderingink.com
hyggehomesteader.com
roadstown.com
niezenrele.quest
amplifybrandmarketing.com
luxerlegends.com
hellogeek.digital
kellykhumalo.com
qianhaijcc.com
maquinasabdominales.com
harsors.com
islamiturksanatlari.com
blenderistic.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2892-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2892-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2868-22-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2140 set thread context of 2892 2140 zYqJmECKmhz499J.exe 31 PID 2892 set thread context of 1196 2892 zYqJmECKmhz499J.exe 21 PID 2868 set thread context of 1196 2868 NETSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zYqJmECKmhz499J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2868 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2892 zYqJmECKmhz499J.exe 2892 zYqJmECKmhz499J.exe 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE 2868 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2892 zYqJmECKmhz499J.exe 2892 zYqJmECKmhz499J.exe 2892 zYqJmECKmhz499J.exe 2868 NETSTAT.EXE 2868 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2892 zYqJmECKmhz499J.exe Token: SeDebugPrivilege 2868 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2892 2140 zYqJmECKmhz499J.exe 31 PID 2140 wrote to memory of 2892 2140 zYqJmECKmhz499J.exe 31 PID 2140 wrote to memory of 2892 2140 zYqJmECKmhz499J.exe 31 PID 2140 wrote to memory of 2892 2140 zYqJmECKmhz499J.exe 31 PID 2140 wrote to memory of 2892 2140 zYqJmECKmhz499J.exe 31 PID 2140 wrote to memory of 2892 2140 zYqJmECKmhz499J.exe 31 PID 2140 wrote to memory of 2892 2140 zYqJmECKmhz499J.exe 31 PID 1196 wrote to memory of 2868 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2868 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2868 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2868 1196 Explorer.EXE 32 PID 2868 wrote to memory of 2916 2868 NETSTAT.EXE 33 PID 2868 wrote to memory of 2916 2868 NETSTAT.EXE 33 PID 2868 wrote to memory of 2916 2868 NETSTAT.EXE 33 PID 2868 wrote to memory of 2916 2868 NETSTAT.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
-