Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
eAdvice.exe
Resource
win7-20240903-en
General
-
Target
eAdvice.exe
-
Size
803KB
-
MD5
374dfcd12791782c9f84b3dd72c47029
-
SHA1
5462c5daac3985aea3e1dff59f055183a62d9065
-
SHA256
89743e19eb7f977dab3591eda342ac51cead1a15829028a151359e845c10a255
-
SHA512
813de7f1e6fb3bfbcdb40d09bef3161882356f9a786e53206ed17d6e12cd2b5f2615ec619d1de850b994b857285971f03dfc59282b81e5a53eed7fed8db25186
-
SSDEEP
24576:7azjP6+z+2fNzDFnGNsveawUNXit980Ipulg:+XNFnFnGNsvvli980I
Malware Config
Extracted
formbook
4.1
hx303
pureommassage.com
tazo.ltd
zixunzd.top
booksmaven.com
307countertops.com
hbfyjc.com
latinamericabridge.info
cannadocbd.com
doriesvariety.store
tineedst.com
zajdshj.com
xnxaxx.com
drjacobpedraza.com
sensationvisuelle.com
termteach.com
ysialerts.com
kblandscapeinc.net
sheetmatters.com
ledfriday.com
urbare.net
portraitlink9.com
arizonalawenforcement.info
homesalevisions.com
jewelrynme.com
poroshsatellite.com
bsuwpe.info
efpump.com
0715baidu.com
tomasromain.com
2000dain.com
branity.net
itsflippinbaseball.com
amatorialegratis.com
gratiafashion.com
papaimudoutudo.com.br
clicker.world
91hrc.com
sbbparty5.online
shuziyingyu.com
spafoodie.com
normabeauty.com
hevistoundocumental.com
socorroshores.com
foxsped.com
torrinrex.com
dunganepal.com
8yg8m.com
liantaidi.com
lavaligiadigea.com
nightdome.com
wanbure.com
shawndev.com
000pz.com
pharmacy-for-saleonline.com
draughtmate.com
mathbulletin.com
hospitaltests.com
gcclub.net
afroto.site
inspiredwritingandlit.online
qrmnuewb.com
anyxxxtubes2c.com
v5115.com
gerberos.com
regulars6.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2884-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2884-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2884-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1968-28-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions eAdvice.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools eAdvice.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eAdvice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eAdvice.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eAdvice.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 eAdvice.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2404 set thread context of 2884 2404 eAdvice.exe 33 PID 2884 set thread context of 1212 2884 eAdvice.exe 21 PID 2884 set thread context of 1212 2884 eAdvice.exe 21 PID 1968 set thread context of 1212 1968 colorcpl.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eAdvice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eAdvice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3290804112-2823094203-3137964600-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2404 eAdvice.exe 2404 eAdvice.exe 2404 eAdvice.exe 2404 eAdvice.exe 2404 eAdvice.exe 2884 eAdvice.exe 2884 eAdvice.exe 2884 eAdvice.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2884 eAdvice.exe 2884 eAdvice.exe 2884 eAdvice.exe 2884 eAdvice.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe 1968 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2404 eAdvice.exe Token: SeDebugPrivilege 2884 eAdvice.exe Token: SeDebugPrivilege 1968 colorcpl.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2816 2404 eAdvice.exe 32 PID 2404 wrote to memory of 2816 2404 eAdvice.exe 32 PID 2404 wrote to memory of 2816 2404 eAdvice.exe 32 PID 2404 wrote to memory of 2816 2404 eAdvice.exe 32 PID 2404 wrote to memory of 2884 2404 eAdvice.exe 33 PID 2404 wrote to memory of 2884 2404 eAdvice.exe 33 PID 2404 wrote to memory of 2884 2404 eAdvice.exe 33 PID 2404 wrote to memory of 2884 2404 eAdvice.exe 33 PID 2404 wrote to memory of 2884 2404 eAdvice.exe 33 PID 2404 wrote to memory of 2884 2404 eAdvice.exe 33 PID 2404 wrote to memory of 2884 2404 eAdvice.exe 33 PID 2884 wrote to memory of 1968 2884 eAdvice.exe 34 PID 2884 wrote to memory of 1968 2884 eAdvice.exe 34 PID 2884 wrote to memory of 1968 2884 eAdvice.exe 34 PID 2884 wrote to memory of 1968 2884 eAdvice.exe 34 PID 1968 wrote to memory of 820 1968 colorcpl.exe 35 PID 1968 wrote to memory of 820 1968 colorcpl.exe 35 PID 1968 wrote to memory of 820 1968 colorcpl.exe 35 PID 1968 wrote to memory of 820 1968 colorcpl.exe 35 PID 1968 wrote to memory of 820 1968 colorcpl.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\eAdvice.exe"C:\Users\Admin\AppData\Local\Temp\eAdvice.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\eAdvice.exe"{path}"3⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\eAdvice.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:820
-
-
-
-