Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
bobbyx.exe
Resource
win7-20241023-en
General
-
Target
bobbyx.exe
-
Size
943KB
-
MD5
c578ab7bf915d54643e598c11c9922ea
-
SHA1
641b517407aa07cfc70535dff27c667f6f104585
-
SHA256
16a6d8b24f3aeaa9e7612b8dec2f4c67332dca369774ef8200a076716f89defb
-
SHA512
3d6182d73242910be74be87b6b5fe9375b34dfc20ea1e66086b72c094beff01d931305121e6218c696f82c3b97e4d4b820ef5df045cc601326b5bc20e2902b5f
-
SSDEEP
24576:hM8VvGeIup/oNMO0q70ALHbvD4WL4We47y47nAzVWI:JCX+O0qIAzv4WF77X7nwW
Malware Config
Extracted
formbook
4.1
dtn
sapphirelingerie.com
lsleep.com
mymemama.com
meatpillows.com
gifts2loveone.com
mydalmation.com
hvacsense.com
corr-new-001.host
extremeasset.com
yevhenia-fitness.com
waiwaizhuan.com
sczydyhgwwgc.com
vdddlqhqj.icu
befierce.today
targetkitchen.com
btfjx.com
siteoficial-compreaqui.com
spinecorcenters.com
truestrengthcoaching.com
truebluenetwork.com
ikrcopvl.icu
customerservicesector.com
the-dfc.com
yfloan.com
beautyandthebeastuk.com
codebpermittech.net
youngeurope.art
uyhams.com
chuzzo.com
robat-it.com
xwjyt.com
groups3usa.com
attayampattimurukku.com
onlineortaokulkursu.com
metodocapacitar.com
digital-besser-leben.info
lizzieandcam.com
ericsmobileworkshop.com
ilknuryildiz.online
royalglossesbss.com
fastcowsports.com
mybestfriendreviews.com
easypassiveprofits.com
kentbrumm.com
abearabull.com
theyerf.com
bf2-2j2iw.net
trailertrashacadamy.com
argsssg.com
datevanessa.com
domennyarendi53.net
harrylock.xyz
serenespeaks.com
ierbrasil.com
alinapinskygallery.com
freedomtobelarus.com
856380361.xyz
shavino.com
shyosdy.com
buymyoshc.com
vajacbd.com
rootsandfur.com
rebeccavonbergen.com
cyclingsunglassestrend.com
1983lawyers.com
Signatures
-
Formbook family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4992-8-0x0000000005560000-0x0000000005568000-memory.dmp CustAttr -
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2768-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2768-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4992 set thread context of 2768 4992 bobbyx.exe 102 PID 2768 set thread context of 3540 2768 bobbyx.exe 56 PID 1920 set thread context of 3540 1920 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bobbyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2768 bobbyx.exe 2768 bobbyx.exe 2768 bobbyx.exe 2768 bobbyx.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe 1920 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2768 bobbyx.exe 2768 bobbyx.exe 2768 bobbyx.exe 1920 netsh.exe 1920 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 bobbyx.exe Token: SeDebugPrivilege 1920 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2768 4992 bobbyx.exe 102 PID 4992 wrote to memory of 2768 4992 bobbyx.exe 102 PID 4992 wrote to memory of 2768 4992 bobbyx.exe 102 PID 4992 wrote to memory of 2768 4992 bobbyx.exe 102 PID 4992 wrote to memory of 2768 4992 bobbyx.exe 102 PID 4992 wrote to memory of 2768 4992 bobbyx.exe 102 PID 3540 wrote to memory of 1920 3540 Explorer.EXE 103 PID 3540 wrote to memory of 1920 3540 Explorer.EXE 103 PID 3540 wrote to memory of 1920 3540 Explorer.EXE 103 PID 1920 wrote to memory of 1136 1920 netsh.exe 104 PID 1920 wrote to memory of 1136 1920 netsh.exe 104 PID 1920 wrote to memory of 1136 1920 netsh.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bobbyx.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-