Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
538375308232021.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
538375308232021.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Container ETAbest offer 8796___pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Container ETAbest offer 8796___pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
微信图片_20181017153614.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
微信图片_20181017153614.exe
Resource
win10v2004-20241007-en
General
-
Target
538375308232021.exe
-
Size
853KB
-
MD5
dc09fa8c42e8c65946e8eb777a5be3e8
-
SHA1
53bc5551ad267c44dffa4ba27a7c64045845d05d
-
SHA256
93c2cb3a004ba55c70aa8b1cb9d4444b2294fb9fc5ae479a3abf3c2743c8c532
-
SHA512
5ff0fd59408efcfdba56ade588ba9f3515b5b34d9644bafab4d5d1c71354fd1a71cd6f5ec8e2f607381350eb27da60bddbb2ece09acabc9790e5b1d77d3e5f14
-
SSDEEP
12288:BX33Ez9LvzcTrtWTxwjntMws+dN9Op1LCEDFgAbvjmyV/:BX3yL4ZW+js+D9Gh5ZrOyV/
Malware Config
Extracted
formbook
4.1
gz92
ayurvedichealthformulas.com
plazaconstrutora.com
nat-hetong.info
eapdigital.com
ibluebaytvwdshop.com
committable.com
escapesbyek.com
mywebdesigner.pro
jianianhong.com
benvenutoqui.com
beiyet.com
theartofgifs.com
mbwvyksnk.icu
nshahwelfare.com
hhhservice.com
thechaibali.com
travelscreen.expert
best123-movies.com
leiahin.com
runplay11.com
oorulyh.icu
mypatchworkfamily.com
twerkwhileyouworkplanners.com
bradentonroofwashing.com
donandy.com
lonewolfchad.com
celsisenergy.net
humanweed.com
rosybakery.com
cookinwithsugarlious.com
1s5dnwzwv8tht8vi0v78kde4e.com
heyshopy.com
chibiaegyoshop.com
neverbrokerage.com
theadventurebench.com
psicologiapaula.com
xinke518.com
re-change.net
prodj-gear.com
iamworldwideshop.com
onlinemusiclessons.info
yxsc576.com
staniselevators.com
goldenleashcanine.com
luxormedikal.com
protectcentralcoast.com
jaysfinefood.com
zeneanyasbyerika.com
t-algorithm.net
busty-italian.com
bestlawnkzoo.com
bakeology.store
assured-justice-nl.com
sexf5.com
liveyourmaverick.com
mkt10697.com
suxfi.com
cardiociencia.net
truetoselfclothing.com
mcgrudersfitness.com
savorfullpoints.com
naturesblendsupplements.com
eseskalierteh.com
netechsupport.com
peggeorge.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2576-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2576-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 904 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2268 set thread context of 2576 2268 538375308232021.exe 30 PID 2576 set thread context of 1180 2576 538375308232021.exe 21 PID 2156 set thread context of 1180 2156 mstsc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 538375308232021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2576 538375308232021.exe 2576 538375308232021.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe 2156 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2576 538375308232021.exe 2576 538375308232021.exe 2576 538375308232021.exe 2156 mstsc.exe 2156 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2576 538375308232021.exe Token: SeDebugPrivilege 2156 mstsc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2576 2268 538375308232021.exe 30 PID 2268 wrote to memory of 2576 2268 538375308232021.exe 30 PID 2268 wrote to memory of 2576 2268 538375308232021.exe 30 PID 2268 wrote to memory of 2576 2268 538375308232021.exe 30 PID 2268 wrote to memory of 2576 2268 538375308232021.exe 30 PID 2268 wrote to memory of 2576 2268 538375308232021.exe 30 PID 2268 wrote to memory of 2576 2268 538375308232021.exe 30 PID 1180 wrote to memory of 2156 1180 Explorer.EXE 31 PID 1180 wrote to memory of 2156 1180 Explorer.EXE 31 PID 1180 wrote to memory of 2156 1180 Explorer.EXE 31 PID 1180 wrote to memory of 2156 1180 Explorer.EXE 31 PID 2156 wrote to memory of 904 2156 mstsc.exe 32 PID 2156 wrote to memory of 904 2156 mstsc.exe 32 PID 2156 wrote to memory of 904 2156 mstsc.exe 32 PID 2156 wrote to memory of 904 2156 mstsc.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:904
-
-