Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
Drawings HQ30-DM140.exe
Resource
win7-20240903-en
General
-
Target
Drawings HQ30-DM140.exe
-
Size
831KB
-
MD5
948ea18679d4e41402aac119207292d4
-
SHA1
2bce94385943922147c83ecff9885a90be7512f3
-
SHA256
4dee0eaa7eac6aad2c4a7814d96babd45c25c43c43ab226c403830a5e8470b01
-
SHA512
bb468e0dffa0ac9ca36fd609ba9a9ffab322c86f9dd69ff11b697c93f0a796b1bb6453a1312750017295429932b211de573b39bdc2a3d4c7f1169b5d690551a3
-
SSDEEP
12288:OhHexvpe47IfpKzAKt5/sWFh5BhvnYjp5wylGl:hNpNkxKzzT/dh5BhvnYjp5wylG
Malware Config
Extracted
formbook
4.1
wk31
soroban.xyz
irfirstaid.com
irsaycollection.com
thebardownstairsasheville.com
facebookmeta.business
paypalsupportclient.com
metaversusfacebook.com
litakparuikamazon.com
rivianmotorcompany.com
metaversepro.us
ikramfamilypractice.com
bitcoinfuturesetfs.online
5donline.com
rosemount.us
nicole-steinfort.com
performanceautorepairsj.com
scrabblecheats.us
kjg67amazon.com
formerlyknownasfacebook.com
youtubeandgooglepay.online
alexaequipos.com
iboxmeta.com
metaverse-google.com
shadowinformedtherapist.com
com-ibb.co
blueapplesindia.com
globalsxports.com
myfirstxboxgame.com
irsaymuseum.net
alexanderbransoncommercial.com
akive.kr
facebooktometa.com
ko-bae.com
sunnyleoneporn.xyz
harborverse.com
metaversum.us
microsoftsingles.com
arcam.us
cannatomorrow.net
teslacarbattery.info
wellsfarrgorewards.com
rescuemefirstaid.com
blackdiamondwellingtonfl.com
solusvenator.com
managemylif.com
metafirstcoin.com
alexanderferency.com
mutfilms.com
fedex-express-parcels.com
wellnessfirst-pembroke.ca
authsecurre02.bid
meta-spacex.com
meta-nascar.com
stelladot.us
yaruky.xyz
bitfarms.xyz
airsoftmeta.com
firststepcenter.net
scottdunn.voyage
zenubium.us
healthplans2023.com
metamorphosisfacebook.com
facebooksecurity.cloud
sebaspfc.com
firstho.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2692-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2692-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2692-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3312-28-0x0000000000560000-0x000000000058F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4900 set thread context of 2692 4900 Drawings HQ30-DM140.exe 101 PID 2692 set thread context of 3540 2692 Drawings HQ30-DM140.exe 56 PID 2692 set thread context of 3540 2692 Drawings HQ30-DM140.exe 56 PID 3312 set thread context of 3540 3312 raserver.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Drawings HQ30-DM140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe 3312 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 2692 Drawings HQ30-DM140.exe 3312 raserver.exe 3312 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 Drawings HQ30-DM140.exe Token: SeDebugPrivilege 3312 raserver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2692 4900 Drawings HQ30-DM140.exe 101 PID 4900 wrote to memory of 2692 4900 Drawings HQ30-DM140.exe 101 PID 4900 wrote to memory of 2692 4900 Drawings HQ30-DM140.exe 101 PID 4900 wrote to memory of 2692 4900 Drawings HQ30-DM140.exe 101 PID 4900 wrote to memory of 2692 4900 Drawings HQ30-DM140.exe 101 PID 4900 wrote to memory of 2692 4900 Drawings HQ30-DM140.exe 101 PID 3540 wrote to memory of 3312 3540 Explorer.EXE 102 PID 3540 wrote to memory of 3312 3540 Explorer.EXE 102 PID 3540 wrote to memory of 3312 3540 Explorer.EXE 102 PID 3312 wrote to memory of 1892 3312 raserver.exe 103 PID 3312 wrote to memory of 1892 3312 raserver.exe 103 PID 3312 wrote to memory of 1892 3312 raserver.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Drawings HQ30-DM140.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-