Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
PO_82_4000002414_XLS.exe
Resource
win7-20241023-en
General
-
Target
PO_82_4000002414_XLS.exe
-
Size
805KB
-
MD5
85d7d1da8b13db9c318edb8e0ef6edcd
-
SHA1
d896eed6ed2dffaf9f7253b1642787b92e67f704
-
SHA256
765c1e7486aedffd7021ae5f15c86e549c7b796a5025249781f9c8a6327f4037
-
SHA512
eb82f6bf67635506b5fbcf4ea3b6e409152a54db8ba8d71c6272f88dcf16634c7cd75baaf68180c56a78209e9776a129f71d94a864c6a237663460933c05da52
-
SSDEEP
12288:vAOLPQXFuSL3DuSOYrPkjrV9jqd98+OXwUWT8oogIi1S01T:xLIXFukuSOfrqdLOyDj1R
Malware Config
Extracted
formbook
4.1
sdk
mosquitobandidos.com
yisecurityfirst.com
faip777.icu
nc-tv.com
tifeeds.com
techlez.com
newalbanyironworks.com
shadent.store
therealworldtravel.com
cryptocoinminingpro.com
lobard.com
iamforexbots.com
cottnon.com
dandaanyar.com
browtopia.space
mo-diamond-mining.com
inteholistichealth.clinic
bhargavmistry.com
justgraceboutique.com
africanwomenabroad.com
clewsclinical.community
znfawmh.icu
solutionmirror.com
nicolasghetti.com
nachividalshop.com
naturajewellery.com
unlimitedfp.com
puzzlezen.com
casablancamedspa.com
fejsebesete.com
khstuonostore.store
orbit-vitals.com
keybest.store
hyundaiturkey.com
blackownedcommunities.com
primxent.com
kokoreccibahtiyar.com
xdai.exchange
movitecsandiego.com
27001-iso.com
zwp.xyz
nielsensurevey.com
beautychoicecosmetics.com
miyakekodomoiin.com
handmadefurniturestore.com
fenhstore.com
slingmod.net
donvalleyauto.com
rlq.xyz
saunderslakerental.com
zlkgntr.icu
davesmbit.com
upcas.info
ruiyu8.com
ysth.xyz
blingbutterflies.com
hazyblurcreative.com
sweetymemory.com
unvdigital.com
oneforalldistribution.com
rhonda4richland2.com
financingfordentalwork.com
545amsports.com
daisycartoon.com
mybriefbox.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4992-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4992-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4992-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5092 set thread context of 4992 5092 PO_82_4000002414_XLS.exe 92 PID 4992 set thread context of 3424 4992 PO_82_4000002414_XLS.exe 56 PID 4992 set thread context of 3424 4992 PO_82_4000002414_XLS.exe 56 PID 2632 set thread context of 3424 2632 cmstp.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO_82_4000002414_XLS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 5092 PO_82_4000002414_XLS.exe 5092 PO_82_4000002414_XLS.exe 5092 PO_82_4000002414_XLS.exe 5092 PO_82_4000002414_XLS.exe 5092 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe 2632 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 4992 PO_82_4000002414_XLS.exe 2632 cmstp.exe 2632 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5092 PO_82_4000002414_XLS.exe Token: SeDebugPrivilege 4992 PO_82_4000002414_XLS.exe Token: SeDebugPrivilege 2632 cmstp.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5092 wrote to memory of 1560 5092 PO_82_4000002414_XLS.exe 91 PID 5092 wrote to memory of 1560 5092 PO_82_4000002414_XLS.exe 91 PID 5092 wrote to memory of 1560 5092 PO_82_4000002414_XLS.exe 91 PID 5092 wrote to memory of 4992 5092 PO_82_4000002414_XLS.exe 92 PID 5092 wrote to memory of 4992 5092 PO_82_4000002414_XLS.exe 92 PID 5092 wrote to memory of 4992 5092 PO_82_4000002414_XLS.exe 92 PID 5092 wrote to memory of 4992 5092 PO_82_4000002414_XLS.exe 92 PID 5092 wrote to memory of 4992 5092 PO_82_4000002414_XLS.exe 92 PID 5092 wrote to memory of 4992 5092 PO_82_4000002414_XLS.exe 92 PID 3424 wrote to memory of 2632 3424 Explorer.EXE 93 PID 3424 wrote to memory of 2632 3424 Explorer.EXE 93 PID 3424 wrote to memory of 2632 3424 Explorer.EXE 93 PID 2632 wrote to memory of 4476 2632 cmstp.exe 94 PID 2632 wrote to memory of 4476 2632 cmstp.exe 94 PID 2632 wrote to memory of 4476 2632 cmstp.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\PO_82_4000002414_XLS.exe"C:\Users\Admin\AppData\Local\Temp\PO_82_4000002414_XLS.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\PO_82_4000002414_XLS.exe"{path}"3⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\PO_82_4000002414_XLS.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO_82_4000002414_XLS.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4476
-
-