Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 22:48
Behavioral task
behavioral1
Sample
formbook.exe
Resource
win7-20240708-en
General
-
Target
formbook.exe
-
Size
181KB
-
MD5
93918c623317234901e5846540f3a43d
-
SHA1
a5b49aea492de5430b09fa6c1e07a43a28c92b9d
-
SHA256
8b23c3ddd235c8708c47bf3eec883a6f8ec12656680648400cb4733d9a14e762
-
SHA512
c85af20af3aaabc9dd0e7da5b6dabb923d02c29360b8edd9ce31199311b9723f59a5ba13cf344f5891f4a691f6759954de11c12c5005cc80a9eb87567c274153
-
SSDEEP
3072:TDhzK7wjZWfpsOjxl47KVrK6IUxg2ELN/pP8tGzb4JHg:fhEwYNxy7erK6IUhCt2kzb4JH
Malware Config
Extracted
formbook
4.1
ga4
rivercitygoldens.com
seattlebarkery.com
jxsxdb.com
bet365o1.com
mynexthomedfw.com
scheduleyourintentions.com
vestingfacts.com
angelicasanchezpsicologa.com
constructorariedel.com
myabron.com
askthepotato.com
cuscases.com
dlrioata.com
ilikecircles.com
teamsters401kupsplan.com
79dzb.com
simoneventpros.com
cloversonglyrics.com
intansuper.com
gamefacesydney.com
rangemarketsltd.com
hobbyoo.com
miniperle.com
p17173.com
leveecrossfit.com
despoticat.com
mingchi168.com
zumoapp.xyz
outdoorsmanparadise.com
loveahoodie.net
vigorlifeproject.com
zoomforyourhealth.com
xcusebeseheje.com
avorothforever.com
cornak.xyz
99f91.com
twofishsoft.com
xn--qpr83at9ccyf9y6dksya.site
fisheye.fish
sanskaar.life
afghanmoneyexchange.com
capitalvideos.com
nunezh.com
ghhjddtu.com
emythaccelerators.com
hellocarrey.com
notify-nab.com
ninjamelody.com
qihuo119.com
anandsharmah.com
javedcoaching.com
st883.com
pawhot.com
xisburgueria.com
indiana4biden.com
foodrenewal.com
weibringcreative.com
theloveofliving.com
grandbilisim.com
pleasurezoneplaybook.com
merhomeimprovement.com
mydepressed.com
bolplasticelaguilagt.com
nikoladom.com
onedollarreports.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1728-2-0x0000000000EF0000-0x0000000000F1E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2152 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1728 set thread context of 1204 1728 formbook.exe 21 PID 2392 set thread context of 1204 2392 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1728 formbook.exe 1728 formbook.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1728 formbook.exe 1728 formbook.exe 1728 formbook.exe 2392 rundll32.exe 2392 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 formbook.exe Token: SeDebugPrivilege 2392 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2392 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2392 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2392 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2392 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2392 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2392 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2392 1204 Explorer.EXE 30 PID 2392 wrote to memory of 2152 2392 rundll32.exe 31 PID 2392 wrote to memory of 2152 2392 rundll32.exe 31 PID 2392 wrote to memory of 2152 2392 rundll32.exe 31 PID 2392 wrote to memory of 2152 2392 rundll32.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\formbook.exe"C:\Users\Admin\AppData\Local\Temp\formbook.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\formbook.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2152
-
-