Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
oedei.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
oedei.exe
Resource
win10v2004-20241007-en
General
-
Target
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe
-
Size
303KB
-
MD5
c961fcde5d17604cc66454d49df2cce4
-
SHA1
2a36990e22318e6794597a47e8843fd65dd56ce1
-
SHA256
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02
-
SHA512
0e9db8b031a10780e21707c3d06853e9eea3b2d96648a8f4d9711a5fe4ab090d11588cd3459d35eaf53b8ed670518a307358a46ac579b7f370fb6464bc756d75
-
SSDEEP
6144:rGiko9Al1iqDsAkONYosCxEi9W8A7MmHuvVw0UY:rSl1idGJx/zABuvVw09
Malware Config
Extracted
formbook
4.1
w32e
clubedamente.com
camcooksvegan.com
noesists.com
rajofy.xyz
hoiku-ict-01.com
15mmfilms.com
8dejunio.com
government-grants.xyz
maruflegalfirm.com
jsovip.com
gott7.biz
pearlmgt.com
taiwanryugaku.net
0088cq.xyz
sflministries.com
globaltarnz.com
mavungeni.com
lordantonio.com
beiqingcan.com
dvftfx1.cfd
rosalamashermosa.com
meganwagner.net
thepokehunters.com
shalong58.com
gamad.group
indexcollab.com
leikhi.com
advancingfast.com
segredorevelaado.online
pme-inc.com
totaldigital.info
xn--nmqv2kuwc23ag06l.xn--czru2d
yn8nz14.cfd
drezer.info
arthurohumukini.com
puckfutin.us
denisesartor.com
kitchenusaremodeling.com
heavenlyentities.com
mitralanggengmerdika.com
omameworker.com
herbs4usa.com
kappa9-slack.com
topchoiceventure.com
kindlemanga-comic.com
q0wiely.cfd
z5os7sd.cfd
u5u7cfr.cfd
5fbirqd.cfd
em-curso.com
oarcrgc.info
cuomo.xyz
cleanercreditservices.com
shopseniors.website
watch-mans-trumpet.com
ghd286.xyz
gaoyaotai.com
usae-portal.com
omgcutie.com
taxbuddypk.com
ni67.com
jb-atelier.com
xuermei.net
lvp7v1f.cfd
seocrust.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1796-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1796-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1796-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2208-26-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 1028 oedei.exe 1796 oedei.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 1028 oedei.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1028 set thread context of 1796 1028 oedei.exe 31 PID 1796 set thread context of 1196 1796 oedei.exe 21 PID 1796 set thread context of 1196 1796 oedei.exe 21 PID 2208 set thread context of 1196 2208 help.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oedei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1796 oedei.exe 1796 oedei.exe 1796 oedei.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe 2208 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1796 oedei.exe 1796 oedei.exe 1796 oedei.exe 1796 oedei.exe 2208 help.exe 2208 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1796 oedei.exe Token: SeDebugPrivilege 2208 help.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1028 2408 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 30 PID 2408 wrote to memory of 1028 2408 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 30 PID 2408 wrote to memory of 1028 2408 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 30 PID 2408 wrote to memory of 1028 2408 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 30 PID 1028 wrote to memory of 1796 1028 oedei.exe 31 PID 1028 wrote to memory of 1796 1028 oedei.exe 31 PID 1028 wrote to memory of 1796 1028 oedei.exe 31 PID 1028 wrote to memory of 1796 1028 oedei.exe 31 PID 1028 wrote to memory of 1796 1028 oedei.exe 31 PID 1028 wrote to memory of 1796 1028 oedei.exe 31 PID 1028 wrote to memory of 1796 1028 oedei.exe 31 PID 1196 wrote to memory of 2208 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2208 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2208 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2208 1196 Explorer.EXE 33 PID 2208 wrote to memory of 2956 2208 help.exe 34 PID 2208 wrote to memory of 2956 2208 help.exe 34 PID 2208 wrote to memory of 2956 2208 help.exe 34 PID 2208 wrote to memory of 2956 2208 help.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe"C:\Users\Admin\AppData\Local\Temp\eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\oedei.exeC:\Users\Admin\AppData\Local\Temp\oedei.exe C:\Users\Admin\AppData\Local\Temp\vxgwyb3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\oedei.exeC:\Users\Admin\AppData\Local\Temp\oedei.exe C:\Users\Admin\AppData\Local\Temp\vxgwyb4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\oedei.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD54edd601ceefe5dba66ae940590ded16e
SHA11273d943d6d50086b76f776bca6c2b37843eb9fb
SHA256a4c546b30bea9d344bf0904629167837e0c32f9143ead2aedb342acd8f85d5a2
SHA51212600c5c4e2f0a506f657d1063c2594e6f0d53d941da0cc5684e70e6539733ef50bf99eb4d06699887843fdd0bc33fbed1632b999f2fe4e481c136a3bf4acebb
-
Filesize
117KB
MD52efd32c76b350a2f0ef015379b4e6079
SHA1fe94d4f744e9f38a19350dc7f49443d0b9c744a7
SHA256a498f803fd0cccb67d13228e97ca0d2dcb7cc149b080604efd3dd4f43fb4488c
SHA5129f98a8b54e19bd1ce4819e71bd6e944bc5a476bb2488d1f035de1fdfa59f22fc7c9ee8b5df6715eb5ace9013c4441e573e7a7cbd710e7b4c7d220cf5a3f5273d
-
Filesize
5KB
MD532488c2847bffe8b46bbf2124459b1eb
SHA165c384911d38d9c5dbae0c35a9cf487959615fef
SHA25665940887ee491e50cfe725503c19cb9b130f5ca1c350a4ac58c9d4e6c10f4247
SHA512f8913b48382eb34add23810f570267e83a45b1775a26eb568920802b01cad953c8604a83641bc43539dfcc65863538206ce21b674d0754f9e3fc22392f72f565