Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
igfx.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
igfx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
iwszswbfva.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
iwszswbfva.exe
Resource
win10v2004-20241007-en
General
-
Target
iwszswbfva.exe
-
Size
7KB
-
MD5
256173eb182e2853cbfa0590dfb0cb3a
-
SHA1
c8eadb0d069644a491368497e91d737e4dc41754
-
SHA256
15b35b8bd2d2e94f656e77a105e3ef99946b02c41d773d118ab0c64db578eb5d
-
SHA512
22e88b1ed25e5f8391497255a8bdc7ea1aef876f3f3c9547e334436d8f250c8cc5c45c344b79c7009d15c9556235086190bc2a3bfb637cd3eaa67824cea78af2
-
SSDEEP
96:B5AgpWlt+6vtR/c8CGzNyR5dj+5qB+STbjCXv+:wgUlXrCGud65nSfjCXv+
Malware Config
Extracted
formbook
4.1
wh23
ow9vyvfee.com
alvis.one
mutantgobz.claims
plynofon.com
southofkingst.store
nuvidamedspa.com
coffeeforyou56.com
opaletechevents.com
momobar.life
abcmousu.com
learnicd-11.com
tipokin.xyz
kahvezevki.com
suratdimond.com
oldartists.best
infoepic.info
mattresslabo.com
skarlmotors.com
cl9319x.xyz
med49app.net
vivarellistaging2.com
gwnv.link
ogurecsbatvoi-7.online
littlelionplaycafe.com
floridaindianrivergeoves.com
eyelashacademysurrey.com
elprobetre.store
sexfan.biz
westbay.casino
carmana.store
optitude.finance
neo-hub.us
meadowwoodanimalclinic.com
ok-experts.com
magnoliabymr.com
fenomini.com
miaowu.work
skipermind.com
winstim.com
14123ninemile.com
plegablescr.com
bloommagiccbdburaliste.com
focusing-garef.com
krumobilept.com
norbercik.online
qteko.com
growupmarketingservices.com
alem-holdings.com
entreinnovator3.com
mainlydivision.space
module.live
gtrewegehwewe5.asia
jd8wme.cyou
pingacx757.com
big-teamwork.com
lesyeuxdanslespoches.com
yutighjkdfgjkd.shop
yourstoolsample.com
musntgrumble.com
jurgenremmerie.com
ebade.xyz
johnollieconstruction.com
bioprofumeria.shop
sarithebrand.com
taiguszab.online
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral3/memory/2360-1-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2360-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/444-10-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1540 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2156 set thread context of 2360 2156 iwszswbfva.exe 30 PID 2360 set thread context of 1216 2360 iwszswbfva.exe 21 PID 444 set thread context of 1216 444 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwszswbfva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2360 iwszswbfva.exe 2360 iwszswbfva.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe 444 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2156 iwszswbfva.exe 2360 iwszswbfva.exe 2360 iwszswbfva.exe 2360 iwszswbfva.exe 444 msdt.exe 444 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2360 iwszswbfva.exe Token: SeDebugPrivilege 444 msdt.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2360 2156 iwszswbfva.exe 30 PID 2156 wrote to memory of 2360 2156 iwszswbfva.exe 30 PID 2156 wrote to memory of 2360 2156 iwszswbfva.exe 30 PID 2156 wrote to memory of 2360 2156 iwszswbfva.exe 30 PID 2156 wrote to memory of 2360 2156 iwszswbfva.exe 30 PID 1216 wrote to memory of 444 1216 Explorer.EXE 31 PID 1216 wrote to memory of 444 1216 Explorer.EXE 31 PID 1216 wrote to memory of 444 1216 Explorer.EXE 31 PID 1216 wrote to memory of 444 1216 Explorer.EXE 31 PID 444 wrote to memory of 1540 444 msdt.exe 32 PID 444 wrote to memory of 1540 444 msdt.exe 32 PID 444 wrote to memory of 1540 444 msdt.exe 32 PID 444 wrote to memory of 1540 444 msdt.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\iwszswbfva.exe"C:\Users\Admin\AppData\Local\Temp\iwszswbfva.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\iwszswbfva.exe"C:\Users\Admin\AppData\Local\Temp\iwszswbfva.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\iwszswbfva.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1540
-
-