Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 04:22
Static task
static1
Behavioral task
behavioral1
Sample
PO__63537353636___IME JPEG.exe
Resource
win7-20240903-en
General
-
Target
PO__63537353636___IME JPEG.exe
-
Size
242KB
-
MD5
9e401b1980973e79bc19c1e3ffe174bc
-
SHA1
ee948ec25692949114b3cd2c10d48d17dd2c6ad9
-
SHA256
9d192f8239db65d0e6cbc8e080b2177e237f93cfd8b4a4065bf709ed3b69ac47
-
SHA512
843fb44ba636367a8f7fbf8ade609ac61103769c1850580ec6bea2f01862be54451d0cc3c6e3f4f6dabc6d02c334ae92c69f3d0c6dd0e43c051c3a418fa0f300
-
SSDEEP
6144:93vpQ10lPSHF3riXXNYgTdQDWThv2qwMHtkTXR2i+P9+ZA:FLEAvWutkTBvQ+ZA
Malware Config
Extracted
formbook
4.1
u2s7
mixso.site
rlagnin.com
imini.top
grapejulius.com
pkcomputer.online
surepolka.com
petahansen.com
rodriguezlawncare.net
oscartheelearning.ninja
gcubaang.top
learnserver.site
weddinginthehamptons.com
doctorverma.online
epicsx.com
signmole.shop
storetrade.store
htlenderschampionship.com
tigerexch-official.net
momentum6labs.com
safetyconsultants.sydney
sala-han.xyz
getafdarager.com
boleps.com
controng.click
xuvomei.fun
antoniomx.online
xn--otu08ib2x.xn--io0a7i
tryvirtusinc.com
lexorlift.store
mrnobodyfitness.com
trishshah.realtor
wildwave.net
reyhanlitonerservisi.xyz
buyglasssoftware.com
brightsidewealthplanning.com
digaojiuzhou.live
global-life.one
memeguardeth.com
maxchristianfarrugia.com
formulapremium.online
laponia.shop
nxqdl.shop
omokeni.com
jhuipalj.work
tequilaelgordo.com
betomarques.com
tzbr1h.info
mirtl.xyz
sg-jewelers.com
hoktoto.asia
gcmpodrych.pro
usfpgl9x9d.com
permatecture.info
kimcloutier.online
badectin.xyz
firsttcehfed.cam
servicecoin.site
extremeovenclean.com
marketing-agency.pro
romanycmusic.com
xn--h1afefqv.xn--p1acf
xn--mller-jua.legal
timbobanic.net
areyoumarketingtome.website
erljhonmelano.monster
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2280-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2280-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1520-21-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2516 set thread context of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 2280 set thread context of 1200 2280 Caspol.exe 21 PID 1520 set thread context of 1200 1520 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO__63537353636___IME JPEG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3533259084-2542256011-65585152-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2516 PO__63537353636___IME JPEG.exe 2516 PO__63537353636___IME JPEG.exe 2280 Caspol.exe 2280 Caspol.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2280 Caspol.exe 2280 Caspol.exe 2280 Caspol.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe 1520 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2516 PO__63537353636___IME JPEG.exe Token: SeDebugPrivilege 2280 Caspol.exe Token: SeDebugPrivilege 1520 cmstp.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2488 2516 PO__63537353636___IME JPEG.exe 30 PID 2516 wrote to memory of 2488 2516 PO__63537353636___IME JPEG.exe 30 PID 2516 wrote to memory of 2488 2516 PO__63537353636___IME JPEG.exe 30 PID 2516 wrote to memory of 2488 2516 PO__63537353636___IME JPEG.exe 30 PID 2516 wrote to memory of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 2516 wrote to memory of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 2516 wrote to memory of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 2516 wrote to memory of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 2516 wrote to memory of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 2516 wrote to memory of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 2516 wrote to memory of 2280 2516 PO__63537353636___IME JPEG.exe 31 PID 1200 wrote to memory of 1520 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1520 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1520 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1520 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1520 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1520 1200 Explorer.EXE 32 PID 1200 wrote to memory of 1520 1200 Explorer.EXE 32 PID 1520 wrote to memory of 2648 1520 cmstp.exe 33 PID 1520 wrote to memory of 2648 1520 cmstp.exe 33 PID 1520 wrote to memory of 2648 1520 cmstp.exe 33 PID 1520 wrote to memory of 2648 1520 cmstp.exe 33 PID 1520 wrote to memory of 2648 1520 cmstp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\PO__63537353636___IME JPEG.exe"C:\Users\Admin\AppData\Local\Temp\PO__63537353636___IME JPEG.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"3⤵PID:2488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2648
-
-