Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe
Resource
win7-20240903-en
General
-
Target
0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe
-
Size
1011KB
-
MD5
926683bcefaa5c0f235a2ab849910468
-
SHA1
faad2c56e0daaef20e4fe3b9dc55cc186b05248c
-
SHA256
0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916
-
SHA512
ec484bfac455891323d550c957c658201c2f136c62153c7eb85c9ac0b3366b0f75e25005339ef177da31778f73a1eda2f6d253527b37b8c47eee72f0f435f0e5
-
SSDEEP
24576:bKVAMZ/KKLHceVye1bOTijzw4Go5KGUP:uVAMLf1bQy841KGc
Malware Config
Extracted
formbook
4.1
k8be
wakecountyrealtyexpert.com
marianichola.com
artesaniasyalgomas.com
generationstart.xyz
huaiyou.net
takaokaaki.com
akiactu.info
poulmanfatime.com
mosznowladcy.com
post-consumerism.com
mcdonaldscheeseburger.com
mhkxlgs.com
bigbox.pro
littlekylskap.com
tacos-blog.com
leanbellyofficialstore.online
drakesportsmarketing.com
catholicsinglestv.com
gazoo-bike.com
33sexy.com
abletelephone.systems
pgki87ttp.com
leveluptruckee.com
pricefor.store
phsutah.com
moldespararesina.com
melbournefacials.com
keysthatrock.net
treedecoratingchallenge.com
buyerpalace.com
aktau.group
curebase-test.com
rusticrimboutique.com
thoughtsunderthecrescent.com
ilovecorpus.com
ghettogypsies.com
lq-safe-keepingtoyof4.xyz
7seye.icu
haaelth.com
jetskifishing.online
leoirlandscaping.com
villagegreencoffee.com
bodrumpetgross.com
siamled.com
ff4ci74gs.xyz
c2batlrnd09ustnnaku2721.com
belledescontos.com
heifurther.xyz
buschow-family.com
clapbeatproductions.com
systemfoundation.com
laspalabrasylascosas.com
tuviah.info
iphone13pro.photography
wuliben.com
brangers2.com
change4cancer.store
horsmon-merchanising.com
mymonocular.com
assuredslofpm.xyz
freeparking.tech
mobileticker.info
bandunis.com
kingall.xyz
fpyekklm.quest
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2116-10-0x0000000000400000-0x000000000044F000-memory.dmp formbook behavioral1/memory/2116-7-0x0000000000400000-0x000000000044F000-memory.dmp formbook behavioral1/memory/2116-13-0x0000000000400000-0x000000000044F000-memory.dmp formbook behavioral1/memory/2140-19-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2396 set thread context of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2116 set thread context of 1192 2116 systeminfo.exe 21 PID 2140 set thread context of 1192 2140 colorcpl.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2116 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2116 systeminfo.exe 2116 systeminfo.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe 2140 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2116 systeminfo.exe 2116 systeminfo.exe 2116 systeminfo.exe 2140 colorcpl.exe 2140 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe Token: SeDebugPrivilege 2116 systeminfo.exe Token: SeDebugPrivilege 2140 colorcpl.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 2396 wrote to memory of 2116 2396 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 30 PID 1192 wrote to memory of 2140 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2140 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2140 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2140 1192 Explorer.EXE 31 PID 2140 wrote to memory of 2816 2140 colorcpl.exe 32 PID 2140 wrote to memory of 2816 2140 colorcpl.exe 32 PID 2140 wrote to memory of 2816 2140 colorcpl.exe 32 PID 2140 wrote to memory of 2816 2140 colorcpl.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe"C:\Users\Admin\AppData\Local\Temp\0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\systeminfo.exe"C:\Windows\SysWOW64\systeminfo.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers system information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\systeminfo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-