Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
Drawings HQ30-DM140.exe
Resource
win7-20240903-en
General
-
Target
Drawings HQ30-DM140.exe
-
Size
831KB
-
MD5
948ea18679d4e41402aac119207292d4
-
SHA1
2bce94385943922147c83ecff9885a90be7512f3
-
SHA256
4dee0eaa7eac6aad2c4a7814d96babd45c25c43c43ab226c403830a5e8470b01
-
SHA512
bb468e0dffa0ac9ca36fd609ba9a9ffab322c86f9dd69ff11b697c93f0a796b1bb6453a1312750017295429932b211de573b39bdc2a3d4c7f1169b5d690551a3
-
SSDEEP
12288:OhHexvpe47IfpKzAKt5/sWFh5BhvnYjp5wylGl:hNpNkxKzzT/dh5BhvnYjp5wylG
Malware Config
Extracted
formbook
4.1
wk31
soroban.xyz
irfirstaid.com
irsaycollection.com
thebardownstairsasheville.com
facebookmeta.business
paypalsupportclient.com
metaversusfacebook.com
litakparuikamazon.com
rivianmotorcompany.com
metaversepro.us
ikramfamilypractice.com
bitcoinfuturesetfs.online
5donline.com
rosemount.us
nicole-steinfort.com
performanceautorepairsj.com
scrabblecheats.us
kjg67amazon.com
formerlyknownasfacebook.com
youtubeandgooglepay.online
alexaequipos.com
iboxmeta.com
metaverse-google.com
shadowinformedtherapist.com
com-ibb.co
blueapplesindia.com
globalsxports.com
myfirstxboxgame.com
irsaymuseum.net
alexanderbransoncommercial.com
akive.kr
facebooktometa.com
ko-bae.com
sunnyleoneporn.xyz
harborverse.com
metaversum.us
microsoftsingles.com
arcam.us
cannatomorrow.net
teslacarbattery.info
wellsfarrgorewards.com
rescuemefirstaid.com
blackdiamondwellingtonfl.com
solusvenator.com
managemylif.com
metafirstcoin.com
alexanderferency.com
mutfilms.com
fedex-express-parcels.com
wellnessfirst-pembroke.ca
authsecurre02.bid
meta-spacex.com
meta-nascar.com
stelladot.us
yaruky.xyz
bitfarms.xyz
airsoftmeta.com
firststepcenter.net
scottdunn.voyage
zenubium.us
healthplans2023.com
metamorphosisfacebook.com
facebooksecurity.cloud
sebaspfc.com
firstho.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2776-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2776-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2544-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 3000 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2056 set thread context of 2776 2056 Drawings HQ30-DM140.exe 30 PID 2776 set thread context of 1188 2776 Drawings HQ30-DM140.exe 21 PID 2544 set thread context of 1188 2544 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Drawings HQ30-DM140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2776 Drawings HQ30-DM140.exe 2776 Drawings HQ30-DM140.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe 2544 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2776 Drawings HQ30-DM140.exe 2776 Drawings HQ30-DM140.exe 2776 Drawings HQ30-DM140.exe 2544 chkdsk.exe 2544 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2776 Drawings HQ30-DM140.exe Token: SeDebugPrivilege 2544 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2776 2056 Drawings HQ30-DM140.exe 30 PID 2056 wrote to memory of 2776 2056 Drawings HQ30-DM140.exe 30 PID 2056 wrote to memory of 2776 2056 Drawings HQ30-DM140.exe 30 PID 2056 wrote to memory of 2776 2056 Drawings HQ30-DM140.exe 30 PID 2056 wrote to memory of 2776 2056 Drawings HQ30-DM140.exe 30 PID 2056 wrote to memory of 2776 2056 Drawings HQ30-DM140.exe 30 PID 2056 wrote to memory of 2776 2056 Drawings HQ30-DM140.exe 30 PID 1188 wrote to memory of 2544 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2544 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2544 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2544 1188 Explorer.EXE 31 PID 2544 wrote to memory of 3000 2544 chkdsk.exe 32 PID 2544 wrote to memory of 3000 2544 chkdsk.exe 32 PID 2544 wrote to memory of 3000 2544 chkdsk.exe 32 PID 2544 wrote to memory of 3000 2544 chkdsk.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3000
-
-