Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20240903-en
General
-
Target
PO.exe
-
Size
465KB
-
MD5
4de9bfdd90db75c0b1ad968af9c094b2
-
SHA1
6c674e0cdc8735a3cf9bb6530c1ea08c4da13744
-
SHA256
45cb18a4c71c0330d1d8d493e0e32f7c55e6125d7219b0dedee54ccfe0aa85c9
-
SHA512
93a850a9881aedacfa2fafa35e7f316bcb260f424f4a566e35fdca773f10be1e3f02297c79f2ac882a027489b04f5c952e3c15a0151ece0f9be4ecf2c3318f59
-
SSDEEP
12288:ottbLWQOiDKDfdhBQwEgL8EObvrdz0YOsWN6Ax3ThZB:+bCiDuFhBQwtL8truYONN1B
Malware Config
Extracted
formbook
4.1
s2l6
avispk.store
thomasfreitag.net
audazzo.com
wheelblastspareparts.com
babeson.top
bvvseafood-shop.com
fibertech.xyz
tapscrawlspacecleanup.com
jujiashu.com
lavech.com
kusdportal.com
luissonautodetailing.com
lomboktourist.com
mazaltovgift.com
u3vs.digital
metanovi.win
dakontoys.com
estavrse.com
partnerwithsentri.com
nissanquantum.com
timcouch2.com
hybesbrewery.com
klmyhgjs.com
grimeshood.com
yzklrz.com
blacc.community
chaals.xyz
tauabose.xyz
corpbailey.com
kredit.quest
mentorborgesmvo.net
darklineco.com
thecreativewebmedia.online
banvspak.xyz
archeindustries.com
instrumentsvalley.com
hucklebearychocolates.com
fitkneefitness.com
mystyle87.com
meganchew.com
lxcw48ti.com
crybubo.com
skotyer.com
superprim.com
mixomarketing.com
squid-game-france.store
cjbfagu.xyz
gztlhg.com
otorhrhd.xyz
batdongsanhonnghe.com
zoelefloregifts.com
supao.online
firstratepainters.com
scandinavian.world
v-bags.store
gaveldisplays.com
surfnshrooms.com
metaversepedia.xyz
inde3.com
electedreleasetoview-today.info
strongwomens.com
allaspectscontractingma2.com
laketroodonpaleontology.com
75941pk.com
kameechka.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2844-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2844-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/544-23-0x0000000000890000-0x00000000008BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2044 set thread context of 2844 2044 PO.exe 98 PID 2844 set thread context of 3520 2844 PO.exe 56 PID 544 set thread context of 3520 544 svchost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2844 PO.exe 2844 PO.exe 2844 PO.exe 2844 PO.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe 544 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2844 PO.exe 2844 PO.exe 2844 PO.exe 544 svchost.exe 544 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2844 PO.exe Token: SeDebugPrivilege 544 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2844 2044 PO.exe 98 PID 2044 wrote to memory of 2844 2044 PO.exe 98 PID 2044 wrote to memory of 2844 2044 PO.exe 98 PID 2044 wrote to memory of 2844 2044 PO.exe 98 PID 2044 wrote to memory of 2844 2044 PO.exe 98 PID 2044 wrote to memory of 2844 2044 PO.exe 98 PID 3520 wrote to memory of 544 3520 Explorer.EXE 99 PID 3520 wrote to memory of 544 3520 Explorer.EXE 99 PID 3520 wrote to memory of 544 3520 Explorer.EXE 99 PID 544 wrote to memory of 1512 544 svchost.exe 100 PID 544 wrote to memory of 1512 544 svchost.exe 100 PID 544 wrote to memory of 1512 544 svchost.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-