Analysis
-
max time kernel
147s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
AWB 456789098765.exe
Resource
win7-20241010-en
General
-
Target
AWB 456789098765.exe
-
Size
1.1MB
-
MD5
b785d60412390b52a6c634366a27eb9a
-
SHA1
639dfd8be745805a2e5dfa94df0f52050a5683e5
-
SHA256
08ff2dd59cb681df7b2ac6310a54bfcf990d11b9c7ca3fed51bd043a59e43d52
-
SHA512
9ca769093d504497cc62cb1ad19025c3355c4ad0436a75a9509c19f3d7c983284a0d0c76cf4244de8df8eb313753aeba55fda2293bfde91a112fb17ab7f7a218
-
SSDEEP
12288:mj0c41hw4e/ehLrzR08f9aU0gWYkGGn2E1CSiwlMfQqK3NvxmZxg1hw4e/:KL4LJKQ0U0gYn2u9iwrTN0j4
Malware Config
Extracted
formbook
4.1
na24
confabulator.info
pointsante.com
knoxpak.site
mhonl.site
peter-elliot.co.uk
transmetrics.site
dali001.com
graphicimagestattoo.com
nicesparthiae.biz
dteonfgdelsm.xyz
truegoatapparel.net
firtokyshop.xyz
v7op.icu
exunix.com
77seven-s.com
explorevenda.com
a-prime-sellyourhousefast.fyi
jezierzany.com
983488728.com
heliosbot.xyz
carmi.one
proteca.tech
sistersservingsisters.com
myudgeskat.xyz
hamshor.com
airoceanlogistic.com
lnjgsxperrsrf9630.xyz
chosenrealtor.com
oxytrolbuy.top
mumu.icu
crmkeysolutions.net
militarymanners.com
bazaratcom.com
instalelektro.net
greenbabyresale.com
alexanderreichl.com
7031touhy305.info
flyinganimals.biz
cargohqshipping.net
meirong168.net
an581.com
vokpx.top
yourengineeringsuccess.co.uk
paygocarsltd.com
nskj.net
eightytoeighty.net
findlearn.net
9fenka.com
tracking-order-post.com
chandrasahoo.xyz
itworksinnwarkansas.com
ftzengmachinery.com
xn--8prp8wjqv1gg513a.xn--55qx5d
baldchimpanzee.uk
4pillarzs.com
zeburgers.com
steltetrapes.xyz
fmcowerring.com
krasangsupplies.store
downloadmessages.com
hilightstore.com
a-great-sellyourhousefast.zone
criatini.net
rwxsj.com
dbxft.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2932-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2932-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2900-23-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2756 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2580 set thread context of 2932 2580 AWB 456789098765.exe 29 PID 2932 set thread context of 1192 2932 AWB 456789098765.exe 20 PID 2900 set thread context of 1192 2900 cmd.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB 456789098765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2932 AWB 456789098765.exe 2932 AWB 456789098765.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe 2900 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2932 AWB 456789098765.exe 2932 AWB 456789098765.exe 2932 AWB 456789098765.exe 2900 cmd.exe 2900 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 AWB 456789098765.exe Token: SeDebugPrivilege 2900 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2932 2580 AWB 456789098765.exe 29 PID 2580 wrote to memory of 2932 2580 AWB 456789098765.exe 29 PID 2580 wrote to memory of 2932 2580 AWB 456789098765.exe 29 PID 2580 wrote to memory of 2932 2580 AWB 456789098765.exe 29 PID 2580 wrote to memory of 2932 2580 AWB 456789098765.exe 29 PID 2580 wrote to memory of 2932 2580 AWB 456789098765.exe 29 PID 2580 wrote to memory of 2932 2580 AWB 456789098765.exe 29 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 2900 wrote to memory of 2756 2900 cmd.exe 32 PID 2900 wrote to memory of 2756 2900 cmd.exe 32 PID 2900 wrote to memory of 2756 2900 cmd.exe 32 PID 2900 wrote to memory of 2756 2900 cmd.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2756
-
-