Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
Way-bill doc. 00095760037503375000.exe
Resource
win7-20241010-en
General
-
Target
Way-bill doc. 00095760037503375000.exe
-
Size
993KB
-
MD5
28065df84df23230d9eabcd0a299fd62
-
SHA1
1a11b46fe50ca9509328914932f7c8f2fa58a387
-
SHA256
76ad60aecfad584010ccd54bceb275369376d7587ac24c2cc41fd63c20220a36
-
SHA512
c77166a3559a8638e322f1ba2192cb05b8cdf05ff689c728b556a984b47e53607caea3fec925bdeb428ee49bf9ae5cb4892cc68b52868029602f0206c3fecfe2
-
SSDEEP
12288:8q4FEF1rCGWQz4TboG9f9Oz144qkUEMiUmrf+NGiuNOMRfUpKXq6ZRvu9xojfOd2:J1dkTbooa1FqkUEAJYoMfXq6fwk+E
Malware Config
Extracted
formbook
4.1
crdi
propertyjumpstartwebinar.com
boc-vip.club
polestarnyc.com
travelonlinebiz.com
bukovynaent.com
bestfashoin.com
miniindiastore.com
wehatebillgates.com
holmescountyjusticecourt.com
colectivorenovemosjuntos.com
houstowarehouse.com
aocsw.com
sml-uniform.com
bandanasaint.com
petposhdeluxe.com
ezcscpawq.com
ladiesoption.club
refixu.com
selfwrrrth.com
rovietry.com
enaoc.com
karyolaw.com
diversitymarketingtx.net
browsersentenderbanco.net
samtheshepherd.com
nash-arbitrazh.com
gampang-kerja.tech
ereplacementparrts.com
eventmidasbuy14.com
sia-rikvel.com
top2016.net
686638.com
ton.blue
desktower.net
dbykq020.com
stack30.com
tiendasfotoprix.com
kylesmaier.com
ekmantsang.com
jumlasx.xyz
qingqingyuyin.com
cdnsubs.xyz
maxamoose.com
huelling.com
xn--bjrnnstet-z2a8q.online
betale-posten.com
lalatendu.info
nochipmanicure.net
bichat.website
washington32reds.com
centrodesaludcrecer.com
phihoteldeimedaglioni.com
kilmalliefarms.com
icecreamsocialwp.com
mac-makeup.club
elzooz.com
iqomw.com
bestattorneycle.com
startonsocial.com
purensoessentials.com
therealyolandafay.com
feildwolf.com
nativesupps.com
nbatimeout.com
bendhighswimming.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2704-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2704-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2704-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4076-28-0x0000000000430000-0x000000000045E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 392 set thread context of 2704 392 Way-bill doc. 00095760037503375000.exe 100 PID 2704 set thread context of 3440 2704 Way-bill doc. 00095760037503375000.exe 56 PID 2704 set thread context of 3440 2704 Way-bill doc. 00095760037503375000.exe 56 PID 4076 set thread context of 3440 4076 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Way-bill doc. 00095760037503375000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 392 Way-bill doc. 00095760037503375000.exe 392 Way-bill doc. 00095760037503375000.exe 392 Way-bill doc. 00095760037503375000.exe 392 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe 4076 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 2704 Way-bill doc. 00095760037503375000.exe 4076 help.exe 4076 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 392 Way-bill doc. 00095760037503375000.exe Token: SeDebugPrivilege 2704 Way-bill doc. 00095760037503375000.exe Token: SeDebugPrivilege 4076 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 392 wrote to memory of 2704 392 Way-bill doc. 00095760037503375000.exe 100 PID 392 wrote to memory of 2704 392 Way-bill doc. 00095760037503375000.exe 100 PID 392 wrote to memory of 2704 392 Way-bill doc. 00095760037503375000.exe 100 PID 392 wrote to memory of 2704 392 Way-bill doc. 00095760037503375000.exe 100 PID 392 wrote to memory of 2704 392 Way-bill doc. 00095760037503375000.exe 100 PID 392 wrote to memory of 2704 392 Way-bill doc. 00095760037503375000.exe 100 PID 3440 wrote to memory of 4076 3440 Explorer.EXE 101 PID 3440 wrote to memory of 4076 3440 Explorer.EXE 101 PID 3440 wrote to memory of 4076 3440 Explorer.EXE 101 PID 4076 wrote to memory of 2772 4076 help.exe 102 PID 4076 wrote to memory of 2772 4076 help.exe 102 PID 4076 wrote to memory of 2772 4076 help.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Way-bill doc. 00095760037503375000.exe"C:\Users\Admin\AppData\Local\Temp\Way-bill doc. 00095760037503375000.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Way-bill doc. 00095760037503375000.exe"C:\Users\Admin\AppData\Local\Temp\Way-bill doc. 00095760037503375000.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Way-bill doc. 00095760037503375000.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-