Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
538375308232021.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
538375308232021.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Container ETAbest offer 8796___pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Container ETAbest offer 8796___pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
微信图片_20181017153614.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
微信图片_20181017153614.exe
Resource
win10v2004-20241007-en
General
-
Target
538375308232021.exe
-
Size
853KB
-
MD5
dc09fa8c42e8c65946e8eb777a5be3e8
-
SHA1
53bc5551ad267c44dffa4ba27a7c64045845d05d
-
SHA256
93c2cb3a004ba55c70aa8b1cb9d4444b2294fb9fc5ae479a3abf3c2743c8c532
-
SHA512
5ff0fd59408efcfdba56ade588ba9f3515b5b34d9644bafab4d5d1c71354fd1a71cd6f5ec8e2f607381350eb27da60bddbb2ece09acabc9790e5b1d77d3e5f14
-
SSDEEP
12288:BX33Ez9LvzcTrtWTxwjntMws+dN9Op1LCEDFgAbvjmyV/:BX3yL4ZW+js+D9Gh5ZrOyV/
Malware Config
Extracted
formbook
4.1
gz92
ayurvedichealthformulas.com
plazaconstrutora.com
nat-hetong.info
eapdigital.com
ibluebaytvwdshop.com
committable.com
escapesbyek.com
mywebdesigner.pro
jianianhong.com
benvenutoqui.com
beiyet.com
theartofgifs.com
mbwvyksnk.icu
nshahwelfare.com
hhhservice.com
thechaibali.com
travelscreen.expert
best123-movies.com
leiahin.com
runplay11.com
oorulyh.icu
mypatchworkfamily.com
twerkwhileyouworkplanners.com
bradentonroofwashing.com
donandy.com
lonewolfchad.com
celsisenergy.net
humanweed.com
rosybakery.com
cookinwithsugarlious.com
1s5dnwzwv8tht8vi0v78kde4e.com
heyshopy.com
chibiaegyoshop.com
neverbrokerage.com
theadventurebench.com
psicologiapaula.com
xinke518.com
re-change.net
prodj-gear.com
iamworldwideshop.com
onlinemusiclessons.info
yxsc576.com
staniselevators.com
goldenleashcanine.com
luxormedikal.com
protectcentralcoast.com
jaysfinefood.com
zeneanyasbyerika.com
t-algorithm.net
busty-italian.com
bestlawnkzoo.com
bakeology.store
assured-justice-nl.com
sexf5.com
liveyourmaverick.com
mkt10697.com
suxfi.com
cardiociencia.net
truetoselfclothing.com
mcgrudersfitness.com
savorfullpoints.com
naturesblendsupplements.com
eseskalierteh.com
netechsupport.com
peggeorge.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3820-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3820-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3576 set thread context of 3820 3576 538375308232021.exe 99 PID 3820 set thread context of 3504 3820 538375308232021.exe 56 PID 2032 set thread context of 3504 2032 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 538375308232021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3820 538375308232021.exe 3820 538375308232021.exe 3820 538375308232021.exe 3820 538375308232021.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe 2032 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3820 538375308232021.exe 3820 538375308232021.exe 3820 538375308232021.exe 2032 netsh.exe 2032 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3820 538375308232021.exe Token: SeDebugPrivilege 2032 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3820 3576 538375308232021.exe 99 PID 3576 wrote to memory of 3820 3576 538375308232021.exe 99 PID 3576 wrote to memory of 3820 3576 538375308232021.exe 99 PID 3576 wrote to memory of 3820 3576 538375308232021.exe 99 PID 3576 wrote to memory of 3820 3576 538375308232021.exe 99 PID 3576 wrote to memory of 3820 3576 538375308232021.exe 99 PID 3504 wrote to memory of 2032 3504 Explorer.EXE 100 PID 3504 wrote to memory of 2032 3504 Explorer.EXE 100 PID 3504 wrote to memory of 2032 3504 Explorer.EXE 100 PID 2032 wrote to memory of 3348 2032 netsh.exe 101 PID 2032 wrote to memory of 3348 2032 netsh.exe 101 PID 2032 wrote to memory of 3348 2032 netsh.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\538375308232021.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-