Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
Payment update.exe
Resource
win7-20240903-en
General
-
Target
Payment update.exe
-
Size
741KB
-
MD5
bf34896fa20667412fdfc4f2da5b2b2d
-
SHA1
7af4a5bbb6e45110543cff78a221075cea4de721
-
SHA256
5810c640bb4219ca39bc8a0c8b50f8447e5e47784e75dfdacdce65d5d2c31e47
-
SHA512
adb61d4380e54e03d3aa80ec099fb4a5ba7e78e0246adf1e548f83e8e7adff03067508b637798c8d076960059444adbc981f02ae2ec6e47838be43f83e4c028e
-
SSDEEP
12288:mz2WFHmst7SPQnpAVH2rXOqoZ/wNQm0G+oB7hXC/2aEMnJWYTl:glHT7SPQuFT/80GVBlX/MnJWYT
Malware Config
Extracted
formbook
4.1
bmmo
nosethecat.com
sanfranciscoclothes.com
laonzeprime.com
ecscart.com
pruearomablends.com
birdhousecustoms.com
giftforchange.com
madribr.com
thepickupmerchant.xyz
lidajian.com
gsxsell.com
cancerandwt1.com
paradisereport.com
wpsexcel.com
baranbey.com
kp3d.net
healous.com
eagerlygrowing.com
faultydev.com
virtualcarenearme.com
holeasam.com
simplymatrimonial.com
sidewalkoutreach.com
thecenterranch.com
boorownie.com
franklinthrive.com
ulaulafishco.com
caliber1powerwashing.com
roteradler.com
bailbondinlomita.com
prestigewnd.com
otbola.space
is10024.com
fuckinsnowflake.com
isabido.com
myone.host
mashariksa.com
designerconsignerny.com
dovitioz.com
christianamperai.com
advancedimagingusa.com
chindfireworks.com
smacey.com
yxsc776.com
demandprintshirts.com
yohoki.com
apexx.media
adhebe.com
bondagehappy.com
zi-pack.com
rigiaki.com
handler.co.uk
kimmccarthygroup.com
futureshop4u.com
martinezlh.com
gixuan.net
1negah.net
queridaph.com
redesusa.com
somethingnewstudio.com
dsd11.com
mysweetdreamsart.com
lacesbycaroline.com
franciscanmissionassociates.com
spiritmagnetusa.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2628-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2628-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2636 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1848 set thread context of 2628 1848 Payment update.exe 31 PID 2628 set thread context of 1224 2628 Payment update.exe 21 PID 2640 set thread context of 1224 2640 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2628 Payment update.exe 2628 Payment update.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe 2640 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2628 Payment update.exe 2628 Payment update.exe 2628 Payment update.exe 2640 chkdsk.exe 2640 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2628 Payment update.exe Token: SeDebugPrivilege 2640 chkdsk.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1848 wrote to memory of 2628 1848 Payment update.exe 31 PID 1224 wrote to memory of 2640 1224 Explorer.EXE 32 PID 1224 wrote to memory of 2640 1224 Explorer.EXE 32 PID 1224 wrote to memory of 2640 1224 Explorer.EXE 32 PID 1224 wrote to memory of 2640 1224 Explorer.EXE 32 PID 2640 wrote to memory of 2636 2640 chkdsk.exe 33 PID 2640 wrote to memory of 2636 2640 chkdsk.exe 33 PID 2640 wrote to memory of 2636 2640 chkdsk.exe 33 PID 2640 wrote to memory of 2636 2640 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Payment update.exe"C:\Users\Admin\AppData\Local\Temp\Payment update.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Payment update.exe"C:\Users\Admin\AppData\Local\Temp\Payment update.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2636
-
-