Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
sample1.exe
Resource
win7-20240903-en
General
-
Target
sample1.exe
-
Size
569KB
-
MD5
56046153a51fe6eaa8814f9d11ac34f6
-
SHA1
bd55ff7ab969a8aa5485a6c5c6844e9224780dba
-
SHA256
abd47175466abe2058151e12919ca9501497dbb286909bf7896d20d59fe73ef6
-
SHA512
fd92ff39626538835b8e8eb63c1fbd6c0828d0fc22261077c83b13ce838f72aac58bda29547c3bc3d356e4c4e9af5c8ae5061648fbebd5040b30d31883183770
-
SSDEEP
12288:89KZTldLdFz3HEJi5LAWePIBD0WZqkyn2qDdzffF8jo+P1:89mnLnEId+WuFFfNSP1
Malware Config
Extracted
formbook
4.1
kbm
qyhattj.icu
kyrenegordo.com
tprgaming.com
sparklemodelscebu.com
bladeha.com
19625ne23ave.com
bigbossgreezy.com
topbusinesskerala.com
aikqq.com
imprussts.com
hd282.com
esrholding.com
senxiv.net
arcustomwork.com
buscoveterinaria.com
genhayakawa.com
1sttividalebrownies.com
agenciawebdigital.com
planguin.online
blackmantech.institute
committedworld.com
buscoo.net
rebelionwines.com
igk-media.com
weirconnected.com
transformesuasaude.com
diy-artswork.com
testcitestdpp06.com
hsfejwoej.icu
mariaalvarado.com
chinabusiness.online
teachersthatcare.com
gouyahua.xyz
shreyasbhandare.com
hammerdownministries.com
sexywarexm.com
essential-oil-aromas.com
maliyuyu.com
peterlarsson.com
michaelamckinney.com
tonysmenu.com
aimrents.com
covkpbac.icu
historictriumphfarmmarket.com
leilanazari.com
crowd1indo.com
fennygrosir.com
lucactivities.com
script.trade
xaoiczekha.com
thefamilybubble.com
shopthikmami.com
geopainterdecorators.com
aeeri.com
shopeonlinee.com
drinkrosie.com
organic-teatox.online
ynjinmao.com
reneepan.com
fadin.xyz
2-mind.com
worm.company
anantdixit.com
alersurb.com
4kitsup.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/1672-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1672-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 956 set thread context of 1672 956 sample1.exe 100 PID 1672 set thread context of 3460 1672 sample1.exe 55 PID 1724 set thread context of 3460 1724 colorcpl.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1672 sample1.exe 1672 sample1.exe 1672 sample1.exe 1672 sample1.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe 1724 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1672 sample1.exe 1672 sample1.exe 1672 sample1.exe 1724 colorcpl.exe 1724 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1672 sample1.exe Token: SeDebugPrivilege 1724 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 956 wrote to memory of 1672 956 sample1.exe 100 PID 956 wrote to memory of 1672 956 sample1.exe 100 PID 956 wrote to memory of 1672 956 sample1.exe 100 PID 956 wrote to memory of 1672 956 sample1.exe 100 PID 956 wrote to memory of 1672 956 sample1.exe 100 PID 956 wrote to memory of 1672 956 sample1.exe 100 PID 3460 wrote to memory of 1724 3460 Explorer.EXE 101 PID 3460 wrote to memory of 1724 3460 Explorer.EXE 101 PID 3460 wrote to memory of 1724 3460 Explorer.EXE 101 PID 1724 wrote to memory of 4584 1724 colorcpl.exe 102 PID 1724 wrote to memory of 4584 1724 colorcpl.exe 102 PID 1724 wrote to memory of 4584 1724 colorcpl.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\sample1.exe"C:\Users\Admin\AppData\Local\Temp\sample1.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\sample1.exe"C:\Users\Admin\AppData\Local\Temp\sample1.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\sample1.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4584
-
-