Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 00:19
Static task
static1
Behavioral task
behavioral1
Sample
fslakj4w.exe
Resource
win7-20240903-en
General
-
Target
fslakj4w.exe
-
Size
973KB
-
MD5
f9c0d7cefb55c367f9dda0ba122fea52
-
SHA1
e809b5d8a8659033ebcb58a332b51ab306ad0537
-
SHA256
c193f7d1ed39688cfd7a5589e6c128c21515485b4a0de89dc7e2452f8f751d5f
-
SHA512
abf1fc4b4e862e6a6eff7b3f895dd26938946dd049d99d27c4cdd66cc22cc3d933bd2033e2f0d1ec1730cf49e7108285a67784254278dab7b25ad6924b25283f
-
SSDEEP
12288:FjC/7ZPvq1igKj7QA5Ke7+VvCTdHKCvJtoVE2hmzk5Cd30iE:FClPuOQA577cvCdvroVpqmm0
Malware Config
Extracted
formbook
4.1
n7ak
audereventur.com
huro14.com
wwwjinsha155.com
antiquevendor.com
samuraisoulfood.net
traffic4updates.download
hypersarv.com
rapport-happy-wedding.com
rokutechnosupport.online
allworljob.com
hanaleedossmann.com
kauai-marathon.com
bepbosch.com
kangen-international.com
zoneshopemenowz.com
belviderewrestling.com
ipllink.com
sellingforcreators.com
wwwswty6655.com
qtumboa.com
bazarmoney.net
librosdecienciaficcion.com
shopmomsthebomb.com
vanjacob.com
tgyaa.com
theporncollective.net
hydrabadproperties.com
brindesecologicos.com
sayagayrimenkul.net
4btoken.com
shycedu.com
overall789.top
maison-pierre-bayle.com
elitemediamasters.com
sharmasfabrics.com
hoshamp.com
myultimateleadgenerator.com
office4u.info
thaimart1.com
ultimatewindowusa.com
twoblazesartworks.com
airteloffer.com
shoupaizhao.com
741dakotadr.info
books4arab.net
artedelcioccolato.biz
tjqcu.info
teccoop.net
maturebridesdressguide.com
excelcapfunding.com
bitcoinak.com
profileorderflow.com
unbelievabowboutique.com
midlandshomesolutionsltd.com
healthywithhook.com
stirlingpiper.com
manfast.online
arikorin.com
texastrustedinsurance.com
moodandmystery.com
yh77808.com
s-immotanger.com
runzexd.com
meteoannecy.net
joomlas123.info
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2876-11-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2876-15-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2112 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2512 set thread context of 2876 2512 fslakj4w.exe 32 PID 2876 set thread context of 1232 2876 fslakj4w.exe 21 PID 2052 set thread context of 1232 2052 netsh.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fslakj4w.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2512 fslakj4w.exe 2512 fslakj4w.exe 2876 fslakj4w.exe 2876 fslakj4w.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2876 fslakj4w.exe 2876 fslakj4w.exe 2876 fslakj4w.exe 2052 netsh.exe 2052 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2512 fslakj4w.exe Token: SeDebugPrivilege 2876 fslakj4w.exe Token: SeDebugPrivilege 2052 netsh.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1396 2512 fslakj4w.exe 31 PID 2512 wrote to memory of 1396 2512 fslakj4w.exe 31 PID 2512 wrote to memory of 1396 2512 fslakj4w.exe 31 PID 2512 wrote to memory of 1396 2512 fslakj4w.exe 31 PID 2512 wrote to memory of 2876 2512 fslakj4w.exe 32 PID 2512 wrote to memory of 2876 2512 fslakj4w.exe 32 PID 2512 wrote to memory of 2876 2512 fslakj4w.exe 32 PID 2512 wrote to memory of 2876 2512 fslakj4w.exe 32 PID 2512 wrote to memory of 2876 2512 fslakj4w.exe 32 PID 2512 wrote to memory of 2876 2512 fslakj4w.exe 32 PID 2512 wrote to memory of 2876 2512 fslakj4w.exe 32 PID 1232 wrote to memory of 2052 1232 Explorer.EXE 33 PID 1232 wrote to memory of 2052 1232 Explorer.EXE 33 PID 1232 wrote to memory of 2052 1232 Explorer.EXE 33 PID 1232 wrote to memory of 2052 1232 Explorer.EXE 33 PID 2052 wrote to memory of 2112 2052 netsh.exe 34 PID 2052 wrote to memory of 2112 2052 netsh.exe 34 PID 2052 wrote to memory of 2112 2052 netsh.exe 34 PID 2052 wrote to memory of 2112 2052 netsh.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\fslakj4w.exe"C:\Users\Admin\AppData\Local\Temp\fslakj4w.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\fslakj4w.exe"C:\Users\Admin\AppData\Local\Temp\fslakj4w.exe"3⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\fslakj4w.exe"C:\Users\Admin\AppData\Local\Temp\fslakj4w.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\fslakj4w.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2112
-
-