Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
September Order 013.exe
Resource
win7-20241023-en
General
-
Target
September Order 013.exe
-
Size
457KB
-
MD5
7f8cb6b9584e368e23bb6196b9339d4b
-
SHA1
8a9a15a6918831cda768a458c416ba5f7b4b048a
-
SHA256
6259281a42f5498a686ace4bbe4be976725cbd39d6b0e14725e3d068944e5352
-
SHA512
e5caf85e11c2b1e0683c749dc19a01a6ff75110871452c3bfd4dd5666d5271e52f3d0bdb7367db8234b9fb50519b4b13371347208180057d05e4f0933bc54ddf
-
SSDEEP
12288:GU/un/eEda46PPLrNt91PnGVj7pHqPmS1OfaF1:G8PNL1PG1pEmdC
Malware Config
Extracted
formbook
4.1
v82
fasonplastikenjeksiyon.com
yallamama.com
konsico.net
rahalahrgypt.com
bamboopages.com
rossdailey.com
bqgjgj.space
libertystalehouse.com
ondiscoverybox.net
karinheeling.com
spankmouth.com
yehbro.com
constmotion.com
propertysrv.net
smart-aligner.com
ibuybeerhandles.com
vertelog.com
xn--299ayyg42f.com
lordogtelluride.com
teslaglobalservices.com
atlaslandscapingservice.com
barebeautydesigns.com
clicandclic.com
drunkpoetsociety.com
homesecurt.com
bycoldcut.com
finanzen-online.net
lostcaversgolf.com
elfraza.com
skiniwallet.com
peterhansens.com
a2net.space
a2zknots.com
chimangawilliams.net
zilianmao.com
soodsid.club
kettlebellsamurai.com
m3gallery.net
beercidrrrebates.com
businesspysopaths.com
thehighlanderway.com
zfwgym.com
edarss.com
guoandy.com
vattunongngunghiep.com
comicstartup.com
medicarestoreamarillo.com
michiganstaterp.net
speakermuslim.com
urfxvarmani.com
donateadeck.com
111az.net
iammarqdean.com
nlp4now.com
dunhillred.com
newenglandhemorrhoidclinic.com
kanpurshopee.com
hd279.com
micoshoppe.com
forst-holz.com
mobilehudini.com
vegasscheduler2.com
tonyezshop.com
dogaltrabzon.com
dermsin.xyz
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/3060-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/3060-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1552 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1596 set thread context of 3060 1596 September Order 013.exe 31 PID 3060 set thread context of 1100 3060 September Order 013.exe 20 PID 480 set thread context of 1100 480 rundll32.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language September Order 013.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1596 September Order 013.exe 1596 September Order 013.exe 3060 September Order 013.exe 3060 September Order 013.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe 480 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3060 September Order 013.exe 3060 September Order 013.exe 3060 September Order 013.exe 480 rundll32.exe 480 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1596 September Order 013.exe Token: SeDebugPrivilege 3060 September Order 013.exe Token: SeDebugPrivilege 480 rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2644 1596 September Order 013.exe 30 PID 1596 wrote to memory of 2644 1596 September Order 013.exe 30 PID 1596 wrote to memory of 2644 1596 September Order 013.exe 30 PID 1596 wrote to memory of 2644 1596 September Order 013.exe 30 PID 1596 wrote to memory of 3060 1596 September Order 013.exe 31 PID 1596 wrote to memory of 3060 1596 September Order 013.exe 31 PID 1596 wrote to memory of 3060 1596 September Order 013.exe 31 PID 1596 wrote to memory of 3060 1596 September Order 013.exe 31 PID 1596 wrote to memory of 3060 1596 September Order 013.exe 31 PID 1596 wrote to memory of 3060 1596 September Order 013.exe 31 PID 1596 wrote to memory of 3060 1596 September Order 013.exe 31 PID 1100 wrote to memory of 480 1100 Explorer.EXE 32 PID 1100 wrote to memory of 480 1100 Explorer.EXE 32 PID 1100 wrote to memory of 480 1100 Explorer.EXE 32 PID 1100 wrote to memory of 480 1100 Explorer.EXE 32 PID 1100 wrote to memory of 480 1100 Explorer.EXE 32 PID 1100 wrote to memory of 480 1100 Explorer.EXE 32 PID 1100 wrote to memory of 480 1100 Explorer.EXE 32 PID 480 wrote to memory of 1552 480 rundll32.exe 33 PID 480 wrote to memory of 1552 480 rundll32.exe 33 PID 480 wrote to memory of 1552 480 rundll32.exe 33 PID 480 wrote to memory of 1552 480 rundll32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"3⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1552
-
-