Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
afvwHSigHFXCUeB.exe
Resource
win7-20240903-en
General
-
Target
afvwHSigHFXCUeB.exe
-
Size
790KB
-
MD5
c3fa5d83eb19b8a6ada7964677ea7b10
-
SHA1
34b56181e7ee8ed8d74dfe4395519c5eb28f210c
-
SHA256
b7ac8ccaeb9ae9b7311d3432a0ec471ff103bc32b52b3ab29b649bccf67a875e
-
SHA512
f047817fb405639fca96ade95d197005fa9d307a01f4941898791dc507bd9afbb7ec307b99cdb260cfafb496e696226c2d05712638e0474c2440ece6c6fc0458
-
SSDEEP
12288:5Ui1TAQk1Y95TthyAk237yMW92GtqsnvEHPVKPOldVFO4SA:ai1kI5TDpT3864vEvVKPO3
Malware Config
Extracted
formbook
4.1
wps3
jtekcreations.com
funstuffrus.com
golomt.design
alargebeer.com
gravitybox.info
kiwifruitcar.com
ee34ngty.xyz
sejawco.com
edgeomni.com
ackdistro.com
quangtv.one
m3rrqandonic.com
9512355.com
0ufkf7knwp.xyz
dada8881069.com
androidchitchat.com
freight-indigo.com
poppersvancouver.com
wu7d27eag2dn.xyz
bluemabell.com
chawenatchee.com
alt-foods.com
blisscommunicationdumemo.com
sax2050.com
tyronetewaa.com
artevelin.com
marketgrup.com
desktopvoip.com
eminemlakizmir.com
bzgmhg.com
sysecom.info
incomesurveypublishinginn.com
andaimar.com
orbenvironments.com
dvarseva.com
hntaccord.com
householdersupport.com
reynolds8idy.com
eduardovelasquezofficial.com
jyothimk.com
funapproval.xyz
wellesleybodyinmotion.com
validityforgood.com
apluswdservicesgroup.com
directmktdigital.com
bullsheadbakers.com
hillborotitle.com
datep.xyz
motleygamer.com
onlineschoolslouisiana.com
hummerdude65.net
mantaiyy.com
totalco2.net
meritbadgesnft.com
axxespartners.com
xn--cccwc-xqa46lu53k.world
vectorrremote.com
whovacation.com
foulinekicks.com
herkulenerji.com
jtmklab.xyz
lejiaoba.com
hellmancollectionservices.com
youtubetools.xyz
coderedeem-ph.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1080-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1080-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5016-23-0x0000000000D00000-0x0000000000D2F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3528 set thread context of 1080 3528 afvwHSigHFXCUeB.exe 99 PID 1080 set thread context of 3504 1080 afvwHSigHFXCUeB.exe 56 PID 5016 set thread context of 3504 5016 cscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afvwHSigHFXCUeB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1080 afvwHSigHFXCUeB.exe 1080 afvwHSigHFXCUeB.exe 1080 afvwHSigHFXCUeB.exe 1080 afvwHSigHFXCUeB.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe 5016 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1080 afvwHSigHFXCUeB.exe 1080 afvwHSigHFXCUeB.exe 1080 afvwHSigHFXCUeB.exe 5016 cscript.exe 5016 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1080 afvwHSigHFXCUeB.exe Token: SeDebugPrivilege 5016 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1080 3528 afvwHSigHFXCUeB.exe 99 PID 3528 wrote to memory of 1080 3528 afvwHSigHFXCUeB.exe 99 PID 3528 wrote to memory of 1080 3528 afvwHSigHFXCUeB.exe 99 PID 3528 wrote to memory of 1080 3528 afvwHSigHFXCUeB.exe 99 PID 3528 wrote to memory of 1080 3528 afvwHSigHFXCUeB.exe 99 PID 3528 wrote to memory of 1080 3528 afvwHSigHFXCUeB.exe 99 PID 3504 wrote to memory of 5016 3504 Explorer.EXE 100 PID 3504 wrote to memory of 5016 3504 Explorer.EXE 100 PID 3504 wrote to memory of 5016 3504 Explorer.EXE 100 PID 5016 wrote to memory of 2980 5016 cscript.exe 101 PID 5016 wrote to memory of 2980 5016 cscript.exe 101 PID 5016 wrote to memory of 2980 5016 cscript.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\afvwHSigHFXCUeB.exe"C:\Users\Admin\AppData\Local\Temp\afvwHSigHFXCUeB.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\afvwHSigHFXCUeB.exe"C:\Users\Admin\AppData\Local\Temp\afvwHSigHFXCUeB.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\afvwHSigHFXCUeB.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-