Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
NEW FOB ORDER.scr
Resource
win7-20240729-en
General
-
Target
NEW FOB ORDER.scr
-
Size
564KB
-
MD5
1b368429bb54aa475c67fc2e45380c3f
-
SHA1
ef6e114cd73b2ad5af2da580ff37ec65a789969a
-
SHA256
e6d85a6287cb583fc5dec0b47a3288d9d0bed8e103991797b14a0e16ab41a9b4
-
SHA512
acb661727bf128ba818740cfbfb7fc5705d96ccabd7e736c828d15471d4161f1c9bc729684d0e358728502fc2e227e3ac69bed85e583e549cd10f48f41d00d57
-
SSDEEP
12288:x8qAaehX93VjqTuaxT7HVVOdsxaO6RScOHj:uHaehX93VjOuaj4d0aO6POHj
Malware Config
Extracted
formbook
4.1
s16r
kellieroysellsnc.com
valleylowvoltage.com
mltuo900.xyz
visitingpuntacana.com
weiwushi.com
austintechjob.com
rxstarcbd.com
shopstudioesi.com
filetto-server.xyz
relianceltdbnk.com
unethical.world
yedd.store
esthershhs.com
magaddis.com
scenicdrivetours.com
123gest.com
2020mortagelifeinsurance.com
faceinle.com
integritymarking.com
alfatoto.xyz
nwebcam.com
wu8hx5cpgl3i.xyz
shiningbellsscrubs.com
visitorego.com
101-bg.com
blaccforestsociety.com
caremeinternational.com
devanharle.com
d2h7e3q.xyz
excaliburteacher.com
tatouagejaponais.com
gallematias.com
sobacoffee.com
thetravelbanana.com
artandmag.com
swoutfit.com
pecintaotomotif.com
realkezorup.xyz
shoplitumi.com
taylorhudak.net
prime-links.net
openvmsdatabasemigration.com
digitaltradingforex.com
vocenoazulnovamente.com
ertyuhjul.xyz
yunshangzhongwen.com
psalm686.com
breastfeedcare.com
matjaralmona.com
insurancesalesreps.com
octets.biz
reviewopenaccess.biz
parvatakrachka.com
vector-center.xyz
hatchvi.com
hmamah.com
a-home4you.com
lq-safe-keepingyuchand91.xyz
amplexus.xyz
h3ssel.xyz
aims-colorado.com
clickforrichesvision.com
belcantato.com
minidentalimplantsdaytonoh.com
mlniubi.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/648-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/648-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/836-22-0x0000000000D30000-0x0000000000D5F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1096 set thread context of 648 1096 NEW FOB ORDER.scr 94 PID 648 set thread context of 3436 648 NEW FOB ORDER.scr 56 PID 836 set thread context of 3436 836 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEW FOB ORDER.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1096 NEW FOB ORDER.scr 1096 NEW FOB ORDER.scr 1096 NEW FOB ORDER.scr 1096 NEW FOB ORDER.scr 648 NEW FOB ORDER.scr 648 NEW FOB ORDER.scr 648 NEW FOB ORDER.scr 648 NEW FOB ORDER.scr 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe 836 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 648 NEW FOB ORDER.scr 648 NEW FOB ORDER.scr 648 NEW FOB ORDER.scr 836 help.exe 836 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1096 NEW FOB ORDER.scr Token: SeDebugPrivilege 648 NEW FOB ORDER.scr Token: SeDebugPrivilege 836 help.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1864 1096 NEW FOB ORDER.scr 92 PID 1096 wrote to memory of 1864 1096 NEW FOB ORDER.scr 92 PID 1096 wrote to memory of 1864 1096 NEW FOB ORDER.scr 92 PID 1096 wrote to memory of 2744 1096 NEW FOB ORDER.scr 93 PID 1096 wrote to memory of 2744 1096 NEW FOB ORDER.scr 93 PID 1096 wrote to memory of 2744 1096 NEW FOB ORDER.scr 93 PID 1096 wrote to memory of 648 1096 NEW FOB ORDER.scr 94 PID 1096 wrote to memory of 648 1096 NEW FOB ORDER.scr 94 PID 1096 wrote to memory of 648 1096 NEW FOB ORDER.scr 94 PID 1096 wrote to memory of 648 1096 NEW FOB ORDER.scr 94 PID 1096 wrote to memory of 648 1096 NEW FOB ORDER.scr 94 PID 1096 wrote to memory of 648 1096 NEW FOB ORDER.scr 94 PID 3436 wrote to memory of 836 3436 Explorer.EXE 95 PID 3436 wrote to memory of 836 3436 Explorer.EXE 95 PID 3436 wrote to memory of 836 3436 Explorer.EXE 95 PID 836 wrote to memory of 1356 836 help.exe 96 PID 836 wrote to memory of 1356 836 help.exe 96 PID 836 wrote to memory of 1356 836 help.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr" /S2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"3⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"3⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW FOB ORDER.scr"3⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-