Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
sample1.exe
Resource
win7-20240903-en
General
-
Target
sample1.exe
-
Size
569KB
-
MD5
56046153a51fe6eaa8814f9d11ac34f6
-
SHA1
bd55ff7ab969a8aa5485a6c5c6844e9224780dba
-
SHA256
abd47175466abe2058151e12919ca9501497dbb286909bf7896d20d59fe73ef6
-
SHA512
fd92ff39626538835b8e8eb63c1fbd6c0828d0fc22261077c83b13ce838f72aac58bda29547c3bc3d356e4c4e9af5c8ae5061648fbebd5040b30d31883183770
-
SSDEEP
12288:89KZTldLdFz3HEJi5LAWePIBD0WZqkyn2qDdzffF8jo+P1:89mnLnEId+WuFFfNSP1
Malware Config
Extracted
formbook
4.1
kbm
qyhattj.icu
kyrenegordo.com
tprgaming.com
sparklemodelscebu.com
bladeha.com
19625ne23ave.com
bigbossgreezy.com
topbusinesskerala.com
aikqq.com
imprussts.com
hd282.com
esrholding.com
senxiv.net
arcustomwork.com
buscoveterinaria.com
genhayakawa.com
1sttividalebrownies.com
agenciawebdigital.com
planguin.online
blackmantech.institute
committedworld.com
buscoo.net
rebelionwines.com
igk-media.com
weirconnected.com
transformesuasaude.com
diy-artswork.com
testcitestdpp06.com
hsfejwoej.icu
mariaalvarado.com
chinabusiness.online
teachersthatcare.com
gouyahua.xyz
shreyasbhandare.com
hammerdownministries.com
sexywarexm.com
essential-oil-aromas.com
maliyuyu.com
peterlarsson.com
michaelamckinney.com
tonysmenu.com
aimrents.com
covkpbac.icu
historictriumphfarmmarket.com
leilanazari.com
crowd1indo.com
fennygrosir.com
lucactivities.com
script.trade
xaoiczekha.com
thefamilybubble.com
shopthikmami.com
geopainterdecorators.com
aeeri.com
shopeonlinee.com
drinkrosie.com
organic-teatox.online
ynjinmao.com
reneepan.com
fadin.xyz
2-mind.com
worm.company
anantdixit.com
alersurb.com
4kitsup.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2720-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2720-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2720-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2380 set thread context of 2720 2380 sample1.exe 31 PID 2720 set thread context of 1160 2720 sample1.exe 20 PID 2720 set thread context of 1160 2720 sample1.exe 20 PID 1596 set thread context of 1160 1596 wlanext.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2720 sample1.exe 2720 sample1.exe 2720 sample1.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe 1596 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2720 sample1.exe 2720 sample1.exe 2720 sample1.exe 2720 sample1.exe 1596 wlanext.exe 1596 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 sample1.exe Token: SeDebugPrivilege 1596 wlanext.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2720 2380 sample1.exe 31 PID 2380 wrote to memory of 2720 2380 sample1.exe 31 PID 2380 wrote to memory of 2720 2380 sample1.exe 31 PID 2380 wrote to memory of 2720 2380 sample1.exe 31 PID 2380 wrote to memory of 2720 2380 sample1.exe 31 PID 2380 wrote to memory of 2720 2380 sample1.exe 31 PID 2380 wrote to memory of 2720 2380 sample1.exe 31 PID 1160 wrote to memory of 1596 1160 Explorer.EXE 32 PID 1160 wrote to memory of 1596 1160 Explorer.EXE 32 PID 1160 wrote to memory of 1596 1160 Explorer.EXE 32 PID 1160 wrote to memory of 1596 1160 Explorer.EXE 32 PID 1596 wrote to memory of 2616 1596 wlanext.exe 33 PID 1596 wrote to memory of 2616 1596 wlanext.exe 33 PID 1596 wrote to memory of 2616 1596 wlanext.exe 33 PID 1596 wrote to memory of 2616 1596 wlanext.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\sample1.exe"C:\Users\Admin\AppData\Local\Temp\sample1.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\sample1.exe"C:\Users\Admin\AppData\Local\Temp\sample1.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\sample1.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2616
-
-