Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 00:37
Behavioral task
behavioral1
Sample
formbook.exe
Resource
win7-20241010-en
General
-
Target
formbook.exe
-
Size
181KB
-
MD5
ab063fa349f25116b15276ad1e2251d7
-
SHA1
ddcdf4314f2c187d04a066380d97959e62c34dbd
-
SHA256
dc769e89feccc886334377b01f29dfe4b36c3266c2df8c88ca704919d0b1b938
-
SHA512
98abbe10c466b8798093963a479fd8bffcc8027feb2be361a092a98ea32f4960a1dc0e14bbd606752db3950fdb84b17763c81db6911390c88c91fbbacb56687c
-
SSDEEP
3072:/qpUoiXhkew9hCgu9gbxNkqqh7vIu+fiL2+TLmym/yyA2jh:Dxtw6gOuxaqqh7+aKsCymqHwh
Malware Config
Extracted
formbook
4.1
zvf
slimytrout.com
ericdykema.com
pennystanwayart.com
auliawijayadecor.com
iyundun.com
postforearn.com
xn--4dbaigbvbe5b1a.net
fishhousemarketandgrill.com
cqweb8.com
serverauthcheckmate.com
betterulasy.com
karenhoverrealtor.com
etigia.com
yinggehong.com
brandprtex.net
pusatcpanel.com
reidec.com
ajscghy.com
tvdajiang6.com
freightlogins.com
naturalngreens.com
yuichiinc.com
alohazola.com
thecincinnatireport.com
yokoyamahospital.com
servicios-computacionales.com
behemothd.com
primerenew.digital
3eex.com
eastedane.com
getathand.com
willb-ruthless.com
chotelfamilyoffices.com
plantbasedbusinesshour.com
femininelyfaded.com
thefloweringmind.com
aneutralbody.com
njohnyk.com
firejar.info
creditrepairoasis.com
actubonplan.com
sabciu.net
ertransbunker.com
kairos-sinergi.com
bantai.xyz
vibsvips.com
karizmakitchen.com
talaservis.com
freepointofview.com
miamisbesthair.com
onlineamericanas.com
subculturecult.com
infobayibalita.com
hunanhailong.com
ticketskenya.com
viraldesignsco.com
showsbeat.com
extraactivities.com
beacukai-banyuwangi.com
bet365n1.com
psicoparatodo.com
assignmyclaims.com
ostseeundmeer.com
teatrodelsorboselvatico.com
kayfg.xyz
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2572-2-0x00000000000F0000-0x000000000011E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2040 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2572 set thread context of 1408 2572 formbook.exe 21 PID 2056 set thread context of 1408 2056 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2572 formbook.exe 2572 formbook.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe 2056 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2572 formbook.exe 2572 formbook.exe 2572 formbook.exe 2056 wlanext.exe 2056 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2572 formbook.exe Token: SeDebugPrivilege 2056 wlanext.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1408 wrote to memory of 2056 1408 Explorer.EXE 31 PID 1408 wrote to memory of 2056 1408 Explorer.EXE 31 PID 1408 wrote to memory of 2056 1408 Explorer.EXE 31 PID 1408 wrote to memory of 2056 1408 Explorer.EXE 31 PID 2056 wrote to memory of 2040 2056 wlanext.exe 32 PID 2056 wrote to memory of 2040 2056 wlanext.exe 32 PID 2056 wrote to memory of 2040 2056 wlanext.exe 32 PID 2056 wrote to memory of 2040 2056 wlanext.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\formbook.exe"C:\Users\Admin\AppData\Local\Temp\formbook.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\formbook.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2040
-
-