Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
AWB 456789098765.exe
Resource
win7-20241010-en
General
-
Target
AWB 456789098765.exe
-
Size
1.1MB
-
MD5
b785d60412390b52a6c634366a27eb9a
-
SHA1
639dfd8be745805a2e5dfa94df0f52050a5683e5
-
SHA256
08ff2dd59cb681df7b2ac6310a54bfcf990d11b9c7ca3fed51bd043a59e43d52
-
SHA512
9ca769093d504497cc62cb1ad19025c3355c4ad0436a75a9509c19f3d7c983284a0d0c76cf4244de8df8eb313753aeba55fda2293bfde91a112fb17ab7f7a218
-
SSDEEP
12288:mj0c41hw4e/ehLrzR08f9aU0gWYkGGn2E1CSiwlMfQqK3NvxmZxg1hw4e/:KL4LJKQ0U0gYn2u9iwrTN0j4
Malware Config
Extracted
formbook
4.1
na24
confabulator.info
pointsante.com
knoxpak.site
mhonl.site
peter-elliot.co.uk
transmetrics.site
dali001.com
graphicimagestattoo.com
nicesparthiae.biz
dteonfgdelsm.xyz
truegoatapparel.net
firtokyshop.xyz
v7op.icu
exunix.com
77seven-s.com
explorevenda.com
a-prime-sellyourhousefast.fyi
jezierzany.com
983488728.com
heliosbot.xyz
carmi.one
proteca.tech
sistersservingsisters.com
myudgeskat.xyz
hamshor.com
airoceanlogistic.com
lnjgsxperrsrf9630.xyz
chosenrealtor.com
oxytrolbuy.top
mumu.icu
crmkeysolutions.net
militarymanners.com
bazaratcom.com
instalelektro.net
greenbabyresale.com
alexanderreichl.com
7031touhy305.info
flyinganimals.biz
cargohqshipping.net
meirong168.net
an581.com
vokpx.top
yourengineeringsuccess.co.uk
paygocarsltd.com
nskj.net
eightytoeighty.net
findlearn.net
9fenka.com
tracking-order-post.com
chandrasahoo.xyz
itworksinnwarkansas.com
ftzengmachinery.com
xn--8prp8wjqv1gg513a.xn--55qx5d
baldchimpanzee.uk
4pillarzs.com
zeburgers.com
steltetrapes.xyz
fmcowerring.com
krasangsupplies.store
downloadmessages.com
hilightstore.com
a-great-sellyourhousefast.zone
criatini.net
rwxsj.com
dbxft.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1972-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1972-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/456-24-0x0000000000740000-0x000000000076F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4356 set thread context of 1972 4356 AWB 456789098765.exe 98 PID 1972 set thread context of 3456 1972 AWB 456789098765.exe 56 PID 456 set thread context of 3456 456 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB 456789098765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1972 AWB 456789098765.exe 1972 AWB 456789098765.exe 1972 AWB 456789098765.exe 1972 AWB 456789098765.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe 456 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1972 AWB 456789098765.exe 1972 AWB 456789098765.exe 1972 AWB 456789098765.exe 456 wscript.exe 456 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1972 AWB 456789098765.exe Token: SeDebugPrivilege 456 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4356 wrote to memory of 1972 4356 AWB 456789098765.exe 98 PID 4356 wrote to memory of 1972 4356 AWB 456789098765.exe 98 PID 4356 wrote to memory of 1972 4356 AWB 456789098765.exe 98 PID 4356 wrote to memory of 1972 4356 AWB 456789098765.exe 98 PID 4356 wrote to memory of 1972 4356 AWB 456789098765.exe 98 PID 4356 wrote to memory of 1972 4356 AWB 456789098765.exe 98 PID 3456 wrote to memory of 456 3456 Explorer.EXE 99 PID 3456 wrote to memory of 456 3456 Explorer.EXE 99 PID 3456 wrote to memory of 456 3456 Explorer.EXE 99 PID 456 wrote to memory of 3152 456 wscript.exe 100 PID 456 wrote to memory of 3152 456 wscript.exe 100 PID 456 wrote to memory of 3152 456 wscript.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-