Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
bobbyx.exe
Resource
win7-20241023-en
General
-
Target
bobbyx.exe
-
Size
943KB
-
MD5
c578ab7bf915d54643e598c11c9922ea
-
SHA1
641b517407aa07cfc70535dff27c667f6f104585
-
SHA256
16a6d8b24f3aeaa9e7612b8dec2f4c67332dca369774ef8200a076716f89defb
-
SHA512
3d6182d73242910be74be87b6b5fe9375b34dfc20ea1e66086b72c094beff01d931305121e6218c696f82c3b97e4d4b820ef5df045cc601326b5bc20e2902b5f
-
SSDEEP
24576:hM8VvGeIup/oNMO0q70ALHbvD4WL4We47y47nAzVWI:JCX+O0qIAzv4WF77X7nwW
Malware Config
Extracted
formbook
4.1
dtn
sapphirelingerie.com
lsleep.com
mymemama.com
meatpillows.com
gifts2loveone.com
mydalmation.com
hvacsense.com
corr-new-001.host
extremeasset.com
yevhenia-fitness.com
waiwaizhuan.com
sczydyhgwwgc.com
vdddlqhqj.icu
befierce.today
targetkitchen.com
btfjx.com
siteoficial-compreaqui.com
spinecorcenters.com
truestrengthcoaching.com
truebluenetwork.com
ikrcopvl.icu
customerservicesector.com
the-dfc.com
yfloan.com
beautyandthebeastuk.com
codebpermittech.net
youngeurope.art
uyhams.com
chuzzo.com
robat-it.com
xwjyt.com
groups3usa.com
attayampattimurukku.com
onlineortaokulkursu.com
metodocapacitar.com
digital-besser-leben.info
lizzieandcam.com
ericsmobileworkshop.com
ilknuryildiz.online
royalglossesbss.com
fastcowsports.com
mybestfriendreviews.com
easypassiveprofits.com
kentbrumm.com
abearabull.com
theyerf.com
bf2-2j2iw.net
trailertrashacadamy.com
argsssg.com
datevanessa.com
domennyarendi53.net
harrylock.xyz
serenespeaks.com
ierbrasil.com
alinapinskygallery.com
freedomtobelarus.com
856380361.xyz
shavino.com
shyosdy.com
buymyoshc.com
vajacbd.com
rootsandfur.com
rebeccavonbergen.com
cyclingsunglassestrend.com
1983lawyers.com
Signatures
-
Formbook family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2412-3-0x0000000000930000-0x0000000000938000-memory.dmp CustAttr -
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2908-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2908-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2908-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2412 set thread context of 2908 2412 bobbyx.exe 31 PID 2908 set thread context of 1204 2908 bobbyx.exe 21 PID 2908 set thread context of 1204 2908 bobbyx.exe 21 PID 2736 set thread context of 1204 2736 netsh.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bobbyx.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2908 bobbyx.exe 2908 bobbyx.exe 2908 bobbyx.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe 2736 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2908 bobbyx.exe 2908 bobbyx.exe 2908 bobbyx.exe 2908 bobbyx.exe 2736 netsh.exe 2736 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2908 bobbyx.exe Token: SeDebugPrivilege 2736 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2908 2412 bobbyx.exe 31 PID 2412 wrote to memory of 2908 2412 bobbyx.exe 31 PID 2412 wrote to memory of 2908 2412 bobbyx.exe 31 PID 2412 wrote to memory of 2908 2412 bobbyx.exe 31 PID 2412 wrote to memory of 2908 2412 bobbyx.exe 31 PID 2412 wrote to memory of 2908 2412 bobbyx.exe 31 PID 2412 wrote to memory of 2908 2412 bobbyx.exe 31 PID 1204 wrote to memory of 2736 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2736 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2736 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2736 1204 Explorer.EXE 32 PID 2736 wrote to memory of 2752 2736 netsh.exe 33 PID 2736 wrote to memory of 2752 2736 netsh.exe 33 PID 2736 wrote to memory of 2752 2736 netsh.exe 33 PID 2736 wrote to memory of 2752 2736 netsh.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2752
-
-