Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
Payment update.exe
Resource
win7-20240903-en
General
-
Target
Payment update.exe
-
Size
741KB
-
MD5
bf34896fa20667412fdfc4f2da5b2b2d
-
SHA1
7af4a5bbb6e45110543cff78a221075cea4de721
-
SHA256
5810c640bb4219ca39bc8a0c8b50f8447e5e47784e75dfdacdce65d5d2c31e47
-
SHA512
adb61d4380e54e03d3aa80ec099fb4a5ba7e78e0246adf1e548f83e8e7adff03067508b637798c8d076960059444adbc981f02ae2ec6e47838be43f83e4c028e
-
SSDEEP
12288:mz2WFHmst7SPQnpAVH2rXOqoZ/wNQm0G+oB7hXC/2aEMnJWYTl:glHT7SPQuFT/80GVBlX/MnJWYT
Malware Config
Extracted
formbook
4.1
bmmo
nosethecat.com
sanfranciscoclothes.com
laonzeprime.com
ecscart.com
pruearomablends.com
birdhousecustoms.com
giftforchange.com
madribr.com
thepickupmerchant.xyz
lidajian.com
gsxsell.com
cancerandwt1.com
paradisereport.com
wpsexcel.com
baranbey.com
kp3d.net
healous.com
eagerlygrowing.com
faultydev.com
virtualcarenearme.com
holeasam.com
simplymatrimonial.com
sidewalkoutreach.com
thecenterranch.com
boorownie.com
franklinthrive.com
ulaulafishco.com
caliber1powerwashing.com
roteradler.com
bailbondinlomita.com
prestigewnd.com
otbola.space
is10024.com
fuckinsnowflake.com
isabido.com
myone.host
mashariksa.com
designerconsignerny.com
dovitioz.com
christianamperai.com
advancedimagingusa.com
chindfireworks.com
smacey.com
yxsc776.com
demandprintshirts.com
yohoki.com
apexx.media
adhebe.com
bondagehappy.com
zi-pack.com
rigiaki.com
handler.co.uk
kimmccarthygroup.com
futureshop4u.com
martinezlh.com
gixuan.net
1negah.net
queridaph.com
redesusa.com
somethingnewstudio.com
dsd11.com
mysweetdreamsart.com
lacesbycaroline.com
franciscanmissionassociates.com
spiritmagnetusa.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2272-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2272-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3776 set thread context of 2272 3776 Payment update.exe 101 PID 2272 set thread context of 3476 2272 Payment update.exe 56 PID 2412 set thread context of 3476 2412 WWAHost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3776 Payment update.exe 3776 Payment update.exe 3776 Payment update.exe 3776 Payment update.exe 2272 Payment update.exe 2272 Payment update.exe 2272 Payment update.exe 2272 Payment update.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe 2412 WWAHost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2272 Payment update.exe 2272 Payment update.exe 2272 Payment update.exe 2412 WWAHost.exe 2412 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3776 Payment update.exe Token: SeDebugPrivilege 2272 Payment update.exe Token: SeDebugPrivilege 2412 WWAHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3776 wrote to memory of 4552 3776 Payment update.exe 99 PID 3776 wrote to memory of 4552 3776 Payment update.exe 99 PID 3776 wrote to memory of 4552 3776 Payment update.exe 99 PID 3776 wrote to memory of 4828 3776 Payment update.exe 100 PID 3776 wrote to memory of 4828 3776 Payment update.exe 100 PID 3776 wrote to memory of 4828 3776 Payment update.exe 100 PID 3776 wrote to memory of 2272 3776 Payment update.exe 101 PID 3776 wrote to memory of 2272 3776 Payment update.exe 101 PID 3776 wrote to memory of 2272 3776 Payment update.exe 101 PID 3776 wrote to memory of 2272 3776 Payment update.exe 101 PID 3776 wrote to memory of 2272 3776 Payment update.exe 101 PID 3776 wrote to memory of 2272 3776 Payment update.exe 101 PID 3476 wrote to memory of 2412 3476 Explorer.EXE 102 PID 3476 wrote to memory of 2412 3476 Explorer.EXE 102 PID 3476 wrote to memory of 2412 3476 Explorer.EXE 102 PID 2412 wrote to memory of 1364 2412 WWAHost.exe 103 PID 2412 wrote to memory of 1364 2412 WWAHost.exe 103 PID 2412 wrote to memory of 1364 2412 WWAHost.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\Payment update.exe"C:\Users\Admin\AppData\Local\Temp\Payment update.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\Payment update.exe"C:\Users\Admin\AppData\Local\Temp\Payment update.exe"3⤵PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\Payment update.exe"C:\Users\Admin\AppData\Local\Temp\Payment update.exe"3⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\Payment update.exe"C:\Users\Admin\AppData\Local\Temp\Payment update.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1364
-
-