Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
oaieFYV.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
oaieFYV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hmyvjhoqve.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
hmyvjhoqve.exe
Resource
win10v2004-20241007-en
General
-
Target
oaieFYV.exe
-
Size
244KB
-
MD5
d8be70132f0b64b10f8b9e2fafdaf7a4
-
SHA1
a83a64696c9872f94fa5ddb592113142845470e6
-
SHA256
ae3f17f0d32a8d4f5e5095108f2f0168755351b4cf1d415fa5c3d953872f990b
-
SHA512
cc33bef65a281b06a595a64736481fd87cf2615a0504b698268663cfc20e60af93e1a0976c97f813187ed01b212bfac2166d0f72626c82e7713979cdae77587b
-
SSDEEP
6144:5weEfHdpdgNEov9JAATML4EVzMRYUBalUCAxs0Qch:adpdxov9/fEVzDlf+NQ+
Malware Config
Extracted
formbook
4.1
oi57
brave-offers.com
holodeath.com
wangzhanlishi.com
themeparkoutfitters.com
7letterspro.com
n8u9hm.xyz
invoicemojo.com
quwokau.art
propertycaretaunton.co.uk
waterpurificationguys.com
iracingf3setups.com
socialbutterflyllc.com
bankid.site
alexscraftsmandesign.com
diamondshop.info
cybersamurai42.com
isippets.com
louareafantasy.com
thebookdealer.co.uk
les-celestines.com
shopilift.com
bedrockmortgages.co.uk
caributupetu.xyz
amazonashospitalar.com
librarealstate.com
juliapet.xyz
banske2.com
yuxincheye.com
uawelcome.online
clarksinnsuites.com
agustoskampanyasinatikla.com
appcloudstore.biz
stormtoy.com
smartbeauty-clinic.com
ranunculaceaemonopodial.beauty
1924biglick.com
hoiquancaudai.com
theharbor.finance
sandysbiryani.com
jvn5.com
pooyaflight.com
louezvotrepiscine.fr
visasafir.info
5sj512.com
zkappex.com
rimissneaker.com
19950322.xyz
166440.com
speedupsm.com
austinlong.info
yourwingtips.com
max965.net
beautyinyah.com
lancedigital.online
anim8stories.xyz
agpackvas.com
jaiswalbusinesssolutions.com
animeno874.com
jeffreyventrella.com
isososo.com
ecordings.com
miesxon.online
zengyiran.xyz
noboadental.com
shopmzbeauty.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2140-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2140-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2688-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2932 hmyvjhoqve.exe 2140 hmyvjhoqve.exe -
Loads dropped DLL 2 IoCs
pid Process 2804 oaieFYV.exe 2932 hmyvjhoqve.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2932 set thread context of 2140 2932 hmyvjhoqve.exe 32 PID 2140 set thread context of 1196 2140 hmyvjhoqve.exe 21 PID 2688 set thread context of 1196 2688 colorcpl.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oaieFYV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmyvjhoqve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2140 hmyvjhoqve.exe 2140 hmyvjhoqve.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2932 hmyvjhoqve.exe 2140 hmyvjhoqve.exe 2140 hmyvjhoqve.exe 2140 hmyvjhoqve.exe 2688 colorcpl.exe 2688 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2140 hmyvjhoqve.exe Token: SeDebugPrivilege 2688 colorcpl.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2932 2804 oaieFYV.exe 30 PID 2804 wrote to memory of 2932 2804 oaieFYV.exe 30 PID 2804 wrote to memory of 2932 2804 oaieFYV.exe 30 PID 2804 wrote to memory of 2932 2804 oaieFYV.exe 30 PID 2932 wrote to memory of 2140 2932 hmyvjhoqve.exe 32 PID 2932 wrote to memory of 2140 2932 hmyvjhoqve.exe 32 PID 2932 wrote to memory of 2140 2932 hmyvjhoqve.exe 32 PID 2932 wrote to memory of 2140 2932 hmyvjhoqve.exe 32 PID 2932 wrote to memory of 2140 2932 hmyvjhoqve.exe 32 PID 1196 wrote to memory of 2688 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2688 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2688 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2688 1196 Explorer.EXE 33 PID 2688 wrote to memory of 2716 2688 colorcpl.exe 34 PID 2688 wrote to memory of 2716 2688 colorcpl.exe 34 PID 2688 wrote to memory of 2716 2688 colorcpl.exe 34 PID 2688 wrote to memory of 2716 2688 colorcpl.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\oaieFYV.exe"C:\Users\Admin\AppData\Local\Temp\oaieFYV.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD500df8877841403a137bc30e8f00d780d
SHA1e05c051c0d7d7b49eec18f33a73e22002c270bf8
SHA2564a3a5f1961878ee5b09e8770a5423ca9aa765e2f8d2c83da69ab80065f33af66
SHA512f48d824065e1d44410c08ce9739b5dcb145f00425b0ed06cb3adc6bc3d1c327faed87225b679eae023ff4325535eb8a27c800ac5e435276f846fe8f1860fe7b0
-
Filesize
185KB
MD5ce6bf425aae7ba0199018f3c39205a7f
SHA16b1ab81a3f6872ba78ff13285c1ff219c31292a7
SHA25687a804eee1662314b699a8178ed8da0fa5be7b07f0205cb81ac3ad9d96a2a01d
SHA5128d7ecb7a2b007a14a6d298ef2976a3f8ad084f4e656d9655ce1650b4e72a11704ad67d7ed9731a6b68b6ed7ee5a19a035db34cc2cb28db46667d1ebce4e0af43
-
Filesize
6KB
MD56b668312b1fc254abf6998f94b7698ad
SHA1f6f70ca64564c0460bfd433c61d567e2188259fa
SHA25612a5d66b2147569c4bb95fc174dd277b1e9ae75dbc3934075f22bace2246fe06
SHA5124f637f37aa50f2f715a48650e1dfe22dbc36bcee71ac6abd6a3d84a349d6c0bdda591daceab8d981c91a25d1286f0e3d890496ac5243d3424b01bdf12d05a3ee