Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
oaieFYV.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
oaieFYV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hmyvjhoqve.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
hmyvjhoqve.exe
Resource
win10v2004-20241007-en
General
-
Target
hmyvjhoqve.exe
-
Size
6KB
-
MD5
6b668312b1fc254abf6998f94b7698ad
-
SHA1
f6f70ca64564c0460bfd433c61d567e2188259fa
-
SHA256
12a5d66b2147569c4bb95fc174dd277b1e9ae75dbc3934075f22bace2246fe06
-
SHA512
4f637f37aa50f2f715a48650e1dfe22dbc36bcee71ac6abd6a3d84a349d6c0bdda591daceab8d981c91a25d1286f0e3d890496ac5243d3424b01bdf12d05a3ee
-
SSDEEP
96:3Igh8GC7hbTAW4IdpYEW+4oyn0Tv9u5bnx:4JGCr4IdpYF+4oyn04
Malware Config
Extracted
formbook
4.1
oi57
brave-offers.com
holodeath.com
wangzhanlishi.com
themeparkoutfitters.com
7letterspro.com
n8u9hm.xyz
invoicemojo.com
quwokau.art
propertycaretaunton.co.uk
waterpurificationguys.com
iracingf3setups.com
socialbutterflyllc.com
bankid.site
alexscraftsmandesign.com
diamondshop.info
cybersamurai42.com
isippets.com
louareafantasy.com
thebookdealer.co.uk
les-celestines.com
shopilift.com
bedrockmortgages.co.uk
caributupetu.xyz
amazonashospitalar.com
librarealstate.com
juliapet.xyz
banske2.com
yuxincheye.com
uawelcome.online
clarksinnsuites.com
agustoskampanyasinatikla.com
appcloudstore.biz
stormtoy.com
smartbeauty-clinic.com
ranunculaceaemonopodial.beauty
1924biglick.com
hoiquancaudai.com
theharbor.finance
sandysbiryani.com
jvn5.com
pooyaflight.com
louezvotrepiscine.fr
visasafir.info
5sj512.com
zkappex.com
rimissneaker.com
19950322.xyz
166440.com
speedupsm.com
austinlong.info
yourwingtips.com
max965.net
beautyinyah.com
lancedigital.online
anim8stories.xyz
agpackvas.com
jaiswalbusinesssolutions.com
animeno874.com
jeffreyventrella.com
isososo.com
ecordings.com
miesxon.online
zengyiran.xyz
noboadental.com
shopmzbeauty.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral3/memory/1824-1-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/1824-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/1824-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2348 set thread context of 1824 2348 hmyvjhoqve.exe 30 PID 1824 set thread context of 1264 1824 hmyvjhoqve.exe 20 PID 1824 set thread context of 1264 1824 hmyvjhoqve.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmyvjhoqve.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1824 hmyvjhoqve.exe 1824 hmyvjhoqve.exe 1824 hmyvjhoqve.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2348 hmyvjhoqve.exe 1824 hmyvjhoqve.exe 1824 hmyvjhoqve.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1824 hmyvjhoqve.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1824 2348 hmyvjhoqve.exe 30 PID 2348 wrote to memory of 1824 2348 hmyvjhoqve.exe 30 PID 2348 wrote to memory of 1824 2348 hmyvjhoqve.exe 30 PID 2348 wrote to memory of 1824 2348 hmyvjhoqve.exe 30 PID 2348 wrote to memory of 1824 2348 hmyvjhoqve.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-