Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/j6m19kru6wpzksw.dll
Resource
win7-20241010-en
General
-
Target
sample.exe
-
Size
459KB
-
MD5
06a466881eb25fe18248221687af6ab3
-
SHA1
17a3c06f08dc5610134292134baa2c4b122e3b98
-
SHA256
f8e9e0ca14f6c6759716590b8880593dc9069d7666adc8ebbbb216e7175a1999
-
SHA512
96b34326e9a8a72ace6c3b584408949f8424caf8d7bcb313a234c1452ee17c814db4277187abd1b15033064d73991bbd6db531b2ba8b0ef8f2d586398fbfbd95
-
SSDEEP
6144:o9X0GbyZbMNeq+B8r2tOVdNOQ+ZyTZt3EMNe0835iP9cMf9A+jbudLGmvtpGsEYl:e00iaeq+8mMteFpiP9jpELGmvtYnYXOs
Malware Config
Extracted
formbook
4.1
ndc
ezy-kitchen.com
steedx.com
angelicacapital.com
mazinglife.com
courtmillbuilders.com
pakoussaapparel.com
thegirlamongthegirlnow.com
melaninandmarscosmetics.com
skylarfeeneyphotography.com
auto-servis.site
casnza.com
good-un.com
wonderfulwanfield.com
cumulustalent.net
cannapecbd.com
westernsocietyspot.club
021jdwx.com
parcelretail.com
lazakanya.com
muslimmediation.com
scrapnforyou.com
mygrangerwater.com
synthpatico.com
localbitcoinesa.com
ruvapy.com
saitezogmile.xyz
beautyshoped.com
clubmusicbus.com
finchhuttontx.com
tianyuanjiandao.com
toumall.net
babamlabirlikte.com
ofertasmundiais.com
ylc1992.com
winsproduct.com
tempatku.com
globalsteelindia.net
mhf-ugou-hinami.com
cntrybounce.com
thefinal7.com
rfidsystemes.com
mediastudio.digital
romanrvs.com
alibaba-venderr.rest
elenanagy.com
structura.store
hushixueyuan.com
boswant.com
tinyshopperu.com
spacecubes.group
phenix-cis.com
gissellasboutique.com
surfbestie.com
lovehoneyco.com
leoparra.com
familycvs.com
latenight-coder.com
e-baybrazil.com
escolaursamaior.com
studentpii.com
livisave.com
szsaxf.com
realworldmemos.com
twicebilingual.com
nolcra.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1332-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1332-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2372 sample.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2372 set thread context of 1332 2372 sample.exe 30 PID 1332 set thread context of 1232 1332 sample.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2820 2768 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 sample.exe 1332 sample.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2372 sample.exe 1332 sample.exe 1332 sample.exe 1332 sample.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1332 sample.exe Token: SeShutdownPrivilege 1232 Explorer.EXE Token: SeShutdownPrivilege 1232 Explorer.EXE Token: SeShutdownPrivilege 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1332 2372 sample.exe 30 PID 2372 wrote to memory of 1332 2372 sample.exe 30 PID 2372 wrote to memory of 1332 2372 sample.exe 30 PID 2372 wrote to memory of 1332 2372 sample.exe 30 PID 2372 wrote to memory of 1332 2372 sample.exe 30 PID 1232 wrote to memory of 2768 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2768 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2768 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2768 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2768 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2768 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2768 1232 Explorer.EXE 34 PID 2768 wrote to memory of 2820 2768 msiexec.exe 35 PID 2768 wrote to memory of 2820 2768 msiexec.exe 35 PID 2768 wrote to memory of 2820 2768 msiexec.exe 35 PID 2768 wrote to memory of 2820 2768 msiexec.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2124
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2944
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2500
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2683⤵
- Program crash
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5fb719cbb8e619a0a53503d32410c099a
SHA12d6a082ec6171fa00509758b25299278d1944657
SHA2561f1a183a52a36d09ce8611504ee629c7c2ef93ad1b09d32fbf2500441b41d0e6
SHA51268f7d338e41ffade872c8175c0dc62dd296dccd32f9d6308bb0a407c60032877bbd5bff4af7dacbcb3fa023f285ce55935defae750ff7e2108f6ff6f5ab22077