Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
sifariş n° 5600885643.exe
Resource
win7-20241023-en
General
-
Target
sifariş n° 5600885643.exe
-
Size
520KB
-
MD5
f8af21f5e6bf374da4096d72e177e639
-
SHA1
6c103339eaf0b787352326a6a801d5ae9d6d0000
-
SHA256
4ef2bca501b3ffbee1ba497670fac37c1a2a27247aa48a955228eb0fa2810120
-
SHA512
e90e298204845519f9c272f857669be6f98948a92b28ba6f063b592bb2898cb18dcc228c243d3601f38c07df9b09f49d80b0700eadfdf909f01f3f2e33835fb8
-
SSDEEP
6144:rHd/9YLC4IDSVtYIttqwFIWkjrLPMAFxJca5MClL6Y6N5pOvRu9+x+zTzV7:h/2qyYIttsBx/2S6YrvRY+Ip
Malware Config
Extracted
formbook
4.1
zs84
kubet66x.online
webtergabuak.com
searlont.top
mariammacghey.xyz
iotcs.dev
soulserenity.online
coop-santarita.com
xn--emagreacomprazer-hpb.site
suistake.xyz
oanavasiu.com
cornerstonepartners.us
rexgrocery.store
4walls.store
kinako105.com
ednateixeirabrand.com
6735468723.online
erin-watson.com
merop.online
evidentexchange.com
1wxba.top
primeutility.shop
gisillabet.com
harcourts.store
eliminacionderonquidos.com
excavatorrentalsfranklin.com
exozuvy.bond
dkmachinery.store
constructionsoluitionstx.com
poolcompanyhouston.com
mastermindenterprises.info
reljanta.com
nguoidepvitoc.site
v-s.dev
scrunchaustralia.store
raymarca.com
shopify-postmaster1.info
kathleenlorenzo.com
mjthngtb.com
gracepropertyandevent.com
canyonstatecrafts.com
skia-faff.xyz
aanfang.com
oyshoppesay.pro
heuristics.xyz
elitecustomsut.net
smartsender.dev
advocaats.online
nutricionmentecuerpo.com
93345.top
ky7355.com
diaryofacitygal.com
inspirecdc.online
wazedy.shop
hxkj.site
illusionsvr.com
carjumpstarts.store
sattelitetrans.com
boreddaoprotocol.com
drysunday.xyz
enourrgj.work
hfhxfcawc.xyz
epicgym.net
daydan.click
kelliefit.site
crtextil.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/1040-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1040-8-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2660-14-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1720 set thread context of 1040 1720 sifariş n° 5600885643.exe 30 PID 1040 set thread context of 1208 1040 CasPol.exe 21 PID 2660 set thread context of 1208 2660 ipconfig.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2660 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1040 CasPol.exe 1040 CasPol.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe 2660 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1040 CasPol.exe 1040 CasPol.exe 1040 CasPol.exe 2660 ipconfig.exe 2660 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1040 CasPol.exe Token: SeDebugPrivilege 2660 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1040 1720 sifariş n° 5600885643.exe 30 PID 1720 wrote to memory of 1040 1720 sifariş n° 5600885643.exe 30 PID 1720 wrote to memory of 1040 1720 sifariş n° 5600885643.exe 30 PID 1720 wrote to memory of 1040 1720 sifariş n° 5600885643.exe 30 PID 1720 wrote to memory of 1040 1720 sifariş n° 5600885643.exe 30 PID 1720 wrote to memory of 1040 1720 sifariş n° 5600885643.exe 30 PID 1720 wrote to memory of 1040 1720 sifariş n° 5600885643.exe 30 PID 1208 wrote to memory of 2660 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2660 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2660 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2660 1208 Explorer.EXE 31 PID 2660 wrote to memory of 2840 2660 ipconfig.exe 32 PID 2660 wrote to memory of 2840 2660 ipconfig.exe 32 PID 2660 wrote to memory of 2840 2660 ipconfig.exe 32 PID 2660 wrote to memory of 2840 2660 ipconfig.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\sifariş n° 5600885643.exe"C:\Users\Admin\AppData\Local\Temp\sifariş n° 5600885643.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-