Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
S12GF803.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
S12GF803.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xsdzemml.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
xsdzemml.exe
Resource
win10v2004-20241007-en
General
-
Target
xsdzemml.exe
-
Size
55KB
-
MD5
e2aa91fb3599cb7cbbd1cb3d5e4c3063
-
SHA1
f4278c4f6e1f3358b1ea4748aa2c9401488b6fb7
-
SHA256
2e61c28dea3a0dcde21b06fba573bac629a6cc2fb464bde2f332f3e8c3ba62df
-
SHA512
f5f91140dbeaf73a724bca50914a13bb4bd180c0a6b4ccc87f7abd34cea94bd0f16d2d601ec8e6fde5d414f24e8078622f2f203d135469213d524a0f4b632ce3
-
SSDEEP
1536:Jl/q6Jo2jwim79h5adPF329aJih1IjzGx5SsR1q2Ym0PPDYlHCX:nq6JBjmpjadPjih1IjzmFrYdwC
Malware Config
Extracted
formbook
4.1
sl12
monsore-records.com
discoverthis.world
ishop-brasil.com
foxeshaveholesintl.com
currenteitherknowledge.xyz
haaph.com
leggacyfarm.com
theaudiobookdb.net
ungerstahlbaubrehna.com
cliphindi.com
thht86.com
b4d5h0t.com
yashentcbsmall.com
ltcibenefits.com
allwaystravelservice.com
1gethear.com
elstery.com
buyervalet.com
snowyrangecpa.com
bshuan.icu
trapiantocapelliospedale.com
nexuscenterofevents.com
theglobalwellnessclub.com
computer-leasing-abtex.com
antwerpdogtrail.com
sulino.xyz
nomadabeans.com
tamarackshome.com
rjtsx.xyz
niuwangmuye.com
littlestdreams.com
xn--jstartcnon-y4a8j.com
3xkskd67.xyz
progresoinvestments.com
marciahawkin.com
zm6umsnd.xyz
mayofflor.com
v-spirits-consulting.com
iluvbxrs.com
vinilos.xyz
brandao.design
mendocinoblog.com
goodmandieselrepair.com
demonionft.com
jmecha.com
vendprograms.com
bizismart.com
aiorefunds.com
blockchainpublictrust.com
panalobet888.com
milanoovest.com
ipssml.com
plugin-app.com
sua36arf.xyz
pictures-planet.com
mljo.xyz
cashforsliverusa.com
inflrhub.com
taksnus.com
diyoutdoorsurvival.com
n73955.com
manisjelita.com
chanelprada.net
voq-products.com
seasonail.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral3/memory/836-1-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/836-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1972 set thread context of 836 1972 xsdzemml.exe 30 PID 836 set thread context of 1128 836 xsdzemml.exe 20 -
Program crash 1 IoCs
pid pid_target Process procid_target 1784 2564 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xsdzemml.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 836 xsdzemml.exe 836 xsdzemml.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 836 xsdzemml.exe 836 xsdzemml.exe 836 xsdzemml.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 836 xsdzemml.exe Token: SeShutdownPrivilege 1128 Explorer.EXE Token: SeShutdownPrivilege 1128 Explorer.EXE Token: SeShutdownPrivilege 1128 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1972 wrote to memory of 836 1972 xsdzemml.exe 30 PID 1972 wrote to memory of 836 1972 xsdzemml.exe 30 PID 1972 wrote to memory of 836 1972 xsdzemml.exe 30 PID 1972 wrote to memory of 836 1972 xsdzemml.exe 30 PID 1972 wrote to memory of 836 1972 xsdzemml.exe 30 PID 1972 wrote to memory of 836 1972 xsdzemml.exe 30 PID 1972 wrote to memory of 836 1972 xsdzemml.exe 30 PID 1128 wrote to memory of 2564 1128 Explorer.EXE 31 PID 1128 wrote to memory of 2564 1128 Explorer.EXE 31 PID 1128 wrote to memory of 2564 1128 Explorer.EXE 31 PID 1128 wrote to memory of 2564 1128 Explorer.EXE 31 PID 1128 wrote to memory of 2564 1128 Explorer.EXE 31 PID 1128 wrote to memory of 2564 1128 Explorer.EXE 31 PID 1128 wrote to memory of 2564 1128 Explorer.EXE 31 PID 2564 wrote to memory of 1784 2564 msiexec.exe 33 PID 2564 wrote to memory of 1784 2564 msiexec.exe 33 PID 2564 wrote to memory of 1784 2564 msiexec.exe 33 PID 2564 wrote to memory of 1784 2564 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\xsdzemml.exe"C:\Users\Admin\AppData\Local\Temp\xsdzemml.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\xsdzemml.exe"C:\Users\Admin\AppData\Local\Temp\xsdzemml.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 2683⤵
- Program crash
PID:1784
-
-