Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wdxsx.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
wdxsx.exe
Resource
win10v2004-20241007-en
General
-
Target
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe
-
Size
315KB
-
MD5
5b9271a33d0ac9c8b59bb27cef2b3834
-
SHA1
98f16671e6b09b68721a73bba9c5a15e7c4ee664
-
SHA256
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec
-
SHA512
b4d7e76b92b641ec2ae6702e5c955ea60ff8b7a5b77e1456fea5118398343c3501dd1f6b1b1e82d60ee5834c583cf22d74ff0b2455e2939e6e88f99562bfb2b6
-
SSDEEP
3072:J1NjcVVnLpPuGDFsb5Rchf8BS6YbMZlfBtwTrSJxbVrWLK9omNYFkPthSPhI/cag:zNeZwbcu2mYmJxbnokteYwHqyTV
Malware Config
Extracted
formbook
4.1
e0l9
packingfairturkiye.com
khenonline.com
mydactil.online
coriliechty.com
canadazk.com
freeloanseva.com
successvideo.today
infinitelifetransformations.com
unicryptdoge.com
ecolifeco.com
luxefashionaire.com
lqctqtal.xyz
liveexim.com
happyhempbakery.com
paypalverifie.com
wingonvacations.com
flawdogs.com
shalomsingapore.com
ruscc.xyz
yaxi868.com
hizika.com
joansbestshop.xyz
xfcad20.icu
kosaz.online
noticejcb.xyz
njpropertyrecors.com
positionme.site
rommyarf.com
vacumeet.xyz
societalsystemic.com
securitenovo.com
kingstreetlife.com
ridgwayracing.com
ndcqchc.com
rever-age.com
green-stone.solutions
idyijr28j.xyz
dailyjointhealth.com
computevault.com
thetimewheel.com
hilutv.xyz
shanaesbeauty.com
cryptwo.xyz
andro.finance
steady.store
gangsha2001.com
wodev.biz
affinitybuzz.com
nfhotel.net
westfieldswetlands.com
fatflorida.com
room4rent.net
madamebet.com
ceonsolutions.info
non-transferabletokens.com
rsvip13cvx.xyz
sveshtivosak.com
budunkafunk.com
nginspection.com
newdealny.com
uc-usa.com
tuvanvaytien24h.site
5okx.com
menzelengineering.com
unityassetstock.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2348-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2348-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3024-26-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2600 wdxsx.exe 2348 wdxsx.exe -
Loads dropped DLL 5 IoCs
pid Process 2644 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 2600 wdxsx.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2600 set thread context of 2348 2600 wdxsx.exe 31 PID 2348 set thread context of 1200 2348 wdxsx.exe 21 PID 3024 set thread context of 1200 3024 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2568 2600 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdxsx.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2348 wdxsx.exe 2348 wdxsx.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe 3024 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2348 wdxsx.exe 2348 wdxsx.exe 2348 wdxsx.exe 3024 cmstp.exe 3024 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2348 wdxsx.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeDebugPrivilege 3024 cmstp.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2600 2644 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 30 PID 2644 wrote to memory of 2600 2644 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 30 PID 2644 wrote to memory of 2600 2644 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 30 PID 2644 wrote to memory of 2600 2644 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 30 PID 2600 wrote to memory of 2348 2600 wdxsx.exe 31 PID 2600 wrote to memory of 2348 2600 wdxsx.exe 31 PID 2600 wrote to memory of 2348 2600 wdxsx.exe 31 PID 2600 wrote to memory of 2348 2600 wdxsx.exe 31 PID 2600 wrote to memory of 2348 2600 wdxsx.exe 31 PID 2600 wrote to memory of 2348 2600 wdxsx.exe 31 PID 2600 wrote to memory of 2348 2600 wdxsx.exe 31 PID 2600 wrote to memory of 2568 2600 wdxsx.exe 32 PID 2600 wrote to memory of 2568 2600 wdxsx.exe 32 PID 2600 wrote to memory of 2568 2600 wdxsx.exe 32 PID 2600 wrote to memory of 2568 2600 wdxsx.exe 32 PID 1200 wrote to memory of 3024 1200 Explorer.EXE 33 PID 1200 wrote to memory of 3024 1200 Explorer.EXE 33 PID 1200 wrote to memory of 3024 1200 Explorer.EXE 33 PID 1200 wrote to memory of 3024 1200 Explorer.EXE 33 PID 1200 wrote to memory of 3024 1200 Explorer.EXE 33 PID 1200 wrote to memory of 3024 1200 Explorer.EXE 33 PID 1200 wrote to memory of 3024 1200 Explorer.EXE 33 PID 3024 wrote to memory of 2972 3024 cmstp.exe 34 PID 3024 wrote to memory of 2972 3024 cmstp.exe 34 PID 3024 wrote to memory of 2972 3024 cmstp.exe 34 PID 3024 wrote to memory of 2972 3024 cmstp.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe"C:\Users\Admin\AppData\Local\Temp\1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\wdxsx.exeC:\Users\Admin\AppData\Local\Temp\wdxsx.exe C:\Users\Admin\AppData\Local\Temp\tfygxpzyta3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\wdxsx.exeC:\Users\Admin\AppData\Local\Temp\wdxsx.exe C:\Users\Admin\AppData\Local\Temp\tfygxpzyta4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2164⤵
- Loads dropped DLL
- Program crash
PID:2568
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\wdxsx.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5004bc7879e3c807507d2b7d13a621d78
SHA1099640fec1e090923315f11ebfcc287409a247c0
SHA2568ab5adbc3f6292d67119ff52c25b57d1314fe52961f9236796d06694f509bc9c
SHA512e5f117d136f9c117538ef0890969fdd55927ed49b00287213985eeea04a8ca0f47e5a6180ae076b68ead58f6249689fd6fc51d5be39460786fd9efa776a4f442
-
Filesize
5KB
MD538eada4dc49581c3cae9eee827227c1f
SHA1e964cece3ca9708f3df691c860c5cb2d72e75ab1
SHA2569677c7d4f551e18f7772fa166ebed8d76c7a7928f747c63e8374a80a45342bd2
SHA5124c99eb1d9e2f9a573d71c77cd53f7d10880157b84a182081f1378986b42f9079c84ad8529d53f89dfa3a7ecf5ab3c7cd8ec32ebe3d22b4e5a245175a47d0f94e
-
Filesize
4KB
MD5c23f252a4352c30c3473e3fbbdff84f0
SHA1d7240c2f65d1509e51c8461d835a1b14e167ad4f
SHA2566bc4f989450cc6a3d1e220371fc64029bfac461429b035b8db90ae56af7dae8f
SHA51287ef7be0450bd6b40d1d63fdcb66448b8aee04ec9627dc2aacde848ea83e042763d8ce8b1e94547a00b316ce29447c5a036ca92e3baf5315088cdc473edecbd1