Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 22:48
Behavioral task
behavioral1
Sample
formbook.exe
Resource
win7-20240708-en
General
-
Target
formbook.exe
-
Size
181KB
-
MD5
93918c623317234901e5846540f3a43d
-
SHA1
a5b49aea492de5430b09fa6c1e07a43a28c92b9d
-
SHA256
8b23c3ddd235c8708c47bf3eec883a6f8ec12656680648400cb4733d9a14e762
-
SHA512
c85af20af3aaabc9dd0e7da5b6dabb923d02c29360b8edd9ce31199311b9723f59a5ba13cf344f5891f4a691f6759954de11c12c5005cc80a9eb87567c274153
-
SSDEEP
3072:TDhzK7wjZWfpsOjxl47KVrK6IUxg2ELN/pP8tGzb4JHg:fhEwYNxy7erK6IUhCt2kzb4JH
Malware Config
Extracted
formbook
4.1
ga4
rivercitygoldens.com
seattlebarkery.com
jxsxdb.com
bet365o1.com
mynexthomedfw.com
scheduleyourintentions.com
vestingfacts.com
angelicasanchezpsicologa.com
constructorariedel.com
myabron.com
askthepotato.com
cuscases.com
dlrioata.com
ilikecircles.com
teamsters401kupsplan.com
79dzb.com
simoneventpros.com
cloversonglyrics.com
intansuper.com
gamefacesydney.com
rangemarketsltd.com
hobbyoo.com
miniperle.com
p17173.com
leveecrossfit.com
despoticat.com
mingchi168.com
zumoapp.xyz
outdoorsmanparadise.com
loveahoodie.net
vigorlifeproject.com
zoomforyourhealth.com
xcusebeseheje.com
avorothforever.com
cornak.xyz
99f91.com
twofishsoft.com
xn--qpr83at9ccyf9y6dksya.site
fisheye.fish
sanskaar.life
afghanmoneyexchange.com
capitalvideos.com
nunezh.com
ghhjddtu.com
emythaccelerators.com
hellocarrey.com
notify-nab.com
ninjamelody.com
qihuo119.com
anandsharmah.com
javedcoaching.com
st883.com
pawhot.com
xisburgueria.com
indiana4biden.com
foodrenewal.com
weibringcreative.com
theloveofliving.com
grandbilisim.com
pleasurezoneplaybook.com
merhomeimprovement.com
mydepressed.com
bolplasticelaguilagt.com
nikoladom.com
onedollarreports.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/412-2-0x0000000000FA0000-0x0000000000FCE000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 412 set thread context of 3448 412 formbook.exe 56 PID 4416 set thread context of 3448 4416 mstsc.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language formbook.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 412 formbook.exe 412 formbook.exe 412 formbook.exe 412 formbook.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe 4416 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 412 formbook.exe 412 formbook.exe 412 formbook.exe 4416 mstsc.exe 4416 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 412 formbook.exe Token: SeDebugPrivilege 4416 mstsc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4416 3448 Explorer.EXE 83 PID 3448 wrote to memory of 4416 3448 Explorer.EXE 83 PID 3448 wrote to memory of 4416 3448 Explorer.EXE 83 PID 4416 wrote to memory of 2336 4416 mstsc.exe 89 PID 4416 wrote to memory of 2336 4416 mstsc.exe 89 PID 4416 wrote to memory of 2336 4416 mstsc.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\formbook.exe"C:\Users\Admin\AppData\Local\Temp\formbook.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\formbook.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-