Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20240903-en
General
-
Target
2.exe
-
Size
431KB
-
MD5
39f5517cde8252f68c878e5956071441
-
SHA1
336464c016ef58f9e82075754f200dbe59b593e4
-
SHA256
7cf9a8e9f9164be0f93bfb8810892a0dbaf5f7748105a8375afa3cc558f9d940
-
SHA512
a9f6960f08dd58cdeb5323d8f5d7e12439de61b1f83877a916596a3acb72c6e2bfdf6865da623c9c7bec2996e02446d029ce7a53e2b35484be31468b477d97a4
-
SSDEEP
6144:kmdYfNunWu1IA2UcaYYeAJ3NSMv4DKj1EulrsbCwOI/4WJUsJw3Gp0Xm2YcHYeQm:PDWuqUc5ohNSA4s+uGz/Li2WXm2Yo
Malware Config
Extracted
formbook
4.1
rzt
travelbykeystone.com
gardenstoresupply.com
tobelias.com
thecosmicdna.com
lmshawaii.com
icorn.finance
afontoto.com
usbracesbest.com
unity-title.com
kindredanimal.com
milestonecms.com
aljazeerahlounge.com
jokcreates.com
justjazzythings.com
tiktokbestdeals.com
ww-marketing.com
humblehousekeep.com
alloreklama.com
cranecurrency.info
maraisman.com
waitedsconhncse.com
godstrader.com
bloggingforbacklinks.com
robertwerch.com
controlventas.net
aimss-uk.com
valleyvillagelaundry.com
no-replytop1.com
theurbanmanga.com
business-godfather.com
hondamama.com
thejassybelle.com
carlasachse.com
batalhadamatrix.com
videomarketinginstitute.com
larsonsrotary.com
trickswithwix.com
srphronline.com
askormerdiven.com
786funnel.com
mergedrework.rest
hopeanderson.vacations
guerrillafilmmakingtactics.com
mkt-page.com
todoamateur.com
via-internet-shopping.com
solexpartners.com
therebelelectrician.com
parairanies.info
ywlanyueliang.com
zennode045s.ovh
logisticproductions.com
nashxduccio.com
thefearlessfreddyco.com
garconskin.com
mindabovedefeat.com
dangkygoi.com
bingocleaning.com
eneenfactory.com
magalahi.net
sc-yisen.com
hangcaptoc.com
serialenabler.com
passtop.net
kimnao.info
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/3060-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/3060-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2644 set thread context of 3060 2644 2.exe 30 PID 3060 set thread context of 1204 3060 vbc.exe 21 PID 2068 set thread context of 1204 2068 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3060 vbc.exe 3060 vbc.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3060 vbc.exe 3060 vbc.exe 3060 vbc.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe 2068 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3060 vbc.exe Token: SeDebugPrivilege 2068 chkdsk.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3060 2644 2.exe 30 PID 2644 wrote to memory of 3060 2644 2.exe 30 PID 2644 wrote to memory of 3060 2644 2.exe 30 PID 2644 wrote to memory of 3060 2644 2.exe 30 PID 2644 wrote to memory of 3060 2644 2.exe 30 PID 2644 wrote to memory of 3060 2644 2.exe 30 PID 2644 wrote to memory of 3060 2644 2.exe 30 PID 1204 wrote to memory of 2068 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2068 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2068 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2068 1204 Explorer.EXE 31 PID 2068 wrote to memory of 2104 2068 chkdsk.exe 32 PID 2068 wrote to memory of 2104 2068 chkdsk.exe 32 PID 2068 wrote to memory of 2104 2068 chkdsk.exe 32 PID 2068 wrote to memory of 2104 2068 chkdsk.exe 32 PID 2068 wrote to memory of 2104 2068 chkdsk.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2104
-
-