Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
Items for new project-6109.exe
Resource
win7-20241023-en
General
-
Target
Items for new project-6109.exe
-
Size
519KB
-
MD5
7b2b82719683d8edaf37ec6bd895976f
-
SHA1
bda795d0e7993179ab7606142ea445d9d73872e9
-
SHA256
f500da8f49bd849bb4f6aa7644458bc0473a47e8ce91a09df137906b429e2ee8
-
SHA512
79b9eea7f65ff9a0410842d1b09a5dd550c8573044d016adb1539f646b86c7212b436133f0b991f0e72c7b14a0f8b08f7df64dd938359953270979955e6625ba
-
SSDEEP
12288:LCZhz3tD005nQeOEPEbEiX4FuQWout8FVNLpA:LCZhjC0I2DJUQjFVN
Malware Config
Extracted
formbook
4.1
wk31
soroban.xyz
irfirstaid.com
irsaycollection.com
thebardownstairsasheville.com
facebookmeta.business
paypalsupportclient.com
metaversusfacebook.com
litakparuikamazon.com
rivianmotorcompany.com
metaversepro.us
ikramfamilypractice.com
bitcoinfuturesetfs.online
5donline.com
rosemount.us
nicole-steinfort.com
performanceautorepairsj.com
scrabblecheats.us
kjg67amazon.com
formerlyknownasfacebook.com
youtubeandgooglepay.online
alexaequipos.com
iboxmeta.com
metaverse-google.com
shadowinformedtherapist.com
com-ibb.co
blueapplesindia.com
globalsxports.com
myfirstxboxgame.com
irsaymuseum.net
alexanderbransoncommercial.com
akive.kr
facebooktometa.com
ko-bae.com
sunnyleoneporn.xyz
harborverse.com
metaversum.us
microsoftsingles.com
arcam.us
cannatomorrow.net
teslacarbattery.info
wellsfarrgorewards.com
rescuemefirstaid.com
blackdiamondwellingtonfl.com
solusvenator.com
managemylif.com
metafirstcoin.com
alexanderferency.com
mutfilms.com
fedex-express-parcels.com
wellnessfirst-pembroke.ca
authsecurre02.bid
meta-spacex.com
meta-nascar.com
stelladot.us
yaruky.xyz
bitfarms.xyz
airsoftmeta.com
firststepcenter.net
scottdunn.voyage
zenubium.us
healthplans2023.com
metamorphosisfacebook.com
facebooksecurity.cloud
sebaspfc.com
firstho.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/5100-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5100-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3704-22-0x0000000000690000-0x00000000006BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2440 set thread context of 5100 2440 Items for new project-6109.exe 99 PID 5100 set thread context of 3460 5100 Items for new project-6109.exe 56 PID 3704 set thread context of 3460 3704 control.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Items for new project-6109.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 5100 Items for new project-6109.exe 5100 Items for new project-6109.exe 5100 Items for new project-6109.exe 5100 Items for new project-6109.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe 3704 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 5100 Items for new project-6109.exe 5100 Items for new project-6109.exe 5100 Items for new project-6109.exe 3704 control.exe 3704 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5100 Items for new project-6109.exe Token: SeDebugPrivilege 3704 control.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2440 wrote to memory of 5100 2440 Items for new project-6109.exe 99 PID 2440 wrote to memory of 5100 2440 Items for new project-6109.exe 99 PID 2440 wrote to memory of 5100 2440 Items for new project-6109.exe 99 PID 2440 wrote to memory of 5100 2440 Items for new project-6109.exe 99 PID 2440 wrote to memory of 5100 2440 Items for new project-6109.exe 99 PID 2440 wrote to memory of 5100 2440 Items for new project-6109.exe 99 PID 3460 wrote to memory of 3704 3460 Explorer.EXE 100 PID 3460 wrote to memory of 3704 3460 Explorer.EXE 100 PID 3460 wrote to memory of 3704 3460 Explorer.EXE 100 PID 3704 wrote to memory of 1028 3704 control.exe 101 PID 3704 wrote to memory of 1028 3704 control.exe 101 PID 3704 wrote to memory of 1028 3704 control.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\Items for new project-6109.exe"C:\Users\Admin\AppData\Local\Temp\Items for new project-6109.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Items for new project-6109.exe"C:\Users\Admin\AppData\Local\Temp\Items for new project-6109.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Items for new project-6109.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-