Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
soa.exe
Resource
win7-20240903-en
General
-
Target
soa.exe
-
Size
451KB
-
MD5
db7035b451f169a670b56a3a023b18e8
-
SHA1
d586fb0dbdfb1a37cf8097c3f11f4db745e9faa9
-
SHA256
aeccef59002b851b685cf54307f906c06adb065b68c3eff112f4b0f1442d1349
-
SHA512
fc6f4c6321747aa92301f8ac3d01cae40ad5d51df1cf294e179bd866537de0f5cef7f1b17616efbc2194679b7d7eff8b807d9d1ef9dc12331c497cbb4f89d707
-
SSDEEP
6144:rr5h1r6lmPMk8X25ahxL4XUhaGFo69nwTge6qG5yjNeQFgv8dKgvW:rrH1GIUk83xLfHSTg5qGIjNeDCKg
Malware Config
Extracted
formbook
4.1
bg6
uvs57.info
perfectpointapparel.com
sportsthrem.com
debowerdesigns.com
wzjs99.com
chothuexenangxecauninhbinh.com
blackkeymanagement.com
verdesonline.com
hezehzxx0530.com
alientechcenterlondon.com
body-suit.com
pcfip.com
perocreations.com
mingary.life
goldengoddessglamour.com
reparmaxpro.com
xn--fiqv1al2p20d348d.com
yourhomehealthcarellc.net
weddingproper.com
felicityhorseclub.com
pizzazucca.com
ausu96.com
nathanaeltrahan.com
kenabet.com
madebykat.com
kymsusujinsha.com
zds9999.com
uscawm.com
radhakrishnajeweller.com
bigexchanger.com
iptv008008.com
fhgks.info
sunflowerenergy.net
ernestospaccesi.com
thecyclingvegan.com
vcyrl.info
oliviavaldes.com
xn--iphone-gw7i830b0nltm4k.com
capitalrealestateservices.com
loziship.com
cumulustitle.com
collin-orl.com
842cedar.info
aiico88.com
vivalabavaria.com
heroin.tech
xn--vs2b19v.com
vehiclenotes.com
theoldcaliforniashow.com
incubatorplatform.com
metabolism-news.com
fifatee.com
idea-procedure.tech
sanamastore.com
topguardehub.com
howest.rocks
vanchuyenhanghoagiare.net
middletowntowingservices.com
newsroompk.com
outlawshavingco.com
152manbet.com
tunisiennenue.com
cakeconstructionsupply.com
tictmaster.com
flekcht.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4196-6-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/4196-11-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4484 set thread context of 4196 4484 soa.exe 91 PID 4196 set thread context of 3468 4196 RegSvcs.exe 56 PID 1072 set thread context of 3468 1072 control.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 4484 soa.exe 4196 RegSvcs.exe 4196 RegSvcs.exe 4196 RegSvcs.exe 4196 RegSvcs.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe 1072 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4196 RegSvcs.exe 4196 RegSvcs.exe 4196 RegSvcs.exe 1072 control.exe 1072 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4484 soa.exe Token: SeDebugPrivilege 4196 RegSvcs.exe Token: SeDebugPrivilege 1072 control.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4196 4484 soa.exe 91 PID 4484 wrote to memory of 4196 4484 soa.exe 91 PID 4484 wrote to memory of 4196 4484 soa.exe 91 PID 4484 wrote to memory of 4196 4484 soa.exe 91 PID 4484 wrote to memory of 4196 4484 soa.exe 91 PID 4484 wrote to memory of 4196 4484 soa.exe 91 PID 3468 wrote to memory of 1072 3468 Explorer.EXE 92 PID 3468 wrote to memory of 1072 3468 Explorer.EXE 92 PID 3468 wrote to memory of 1072 3468 Explorer.EXE 92 PID 1072 wrote to memory of 1160 1072 control.exe 93 PID 1072 wrote to memory of 1160 1072 control.exe 93 PID 1072 wrote to memory of 1160 1072 control.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\soa.exe"C:\Users\Admin\AppData\Local\Temp\soa.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-