Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
September Order 013.exe
Resource
win7-20241023-en
General
-
Target
September Order 013.exe
-
Size
457KB
-
MD5
7f8cb6b9584e368e23bb6196b9339d4b
-
SHA1
8a9a15a6918831cda768a458c416ba5f7b4b048a
-
SHA256
6259281a42f5498a686ace4bbe4be976725cbd39d6b0e14725e3d068944e5352
-
SHA512
e5caf85e11c2b1e0683c749dc19a01a6ff75110871452c3bfd4dd5666d5271e52f3d0bdb7367db8234b9fb50519b4b13371347208180057d05e4f0933bc54ddf
-
SSDEEP
12288:GU/un/eEda46PPLrNt91PnGVj7pHqPmS1OfaF1:G8PNL1PG1pEmdC
Malware Config
Extracted
formbook
4.1
v82
fasonplastikenjeksiyon.com
yallamama.com
konsico.net
rahalahrgypt.com
bamboopages.com
rossdailey.com
bqgjgj.space
libertystalehouse.com
ondiscoverybox.net
karinheeling.com
spankmouth.com
yehbro.com
constmotion.com
propertysrv.net
smart-aligner.com
ibuybeerhandles.com
vertelog.com
xn--299ayyg42f.com
lordogtelluride.com
teslaglobalservices.com
atlaslandscapingservice.com
barebeautydesigns.com
clicandclic.com
drunkpoetsociety.com
homesecurt.com
bycoldcut.com
finanzen-online.net
lostcaversgolf.com
elfraza.com
skiniwallet.com
peterhansens.com
a2net.space
a2zknots.com
chimangawilliams.net
zilianmao.com
soodsid.club
kettlebellsamurai.com
m3gallery.net
beercidrrrebates.com
businesspysopaths.com
thehighlanderway.com
zfwgym.com
edarss.com
guoandy.com
vattunongngunghiep.com
comicstartup.com
medicarestoreamarillo.com
michiganstaterp.net
speakermuslim.com
urfxvarmani.com
donateadeck.com
111az.net
iammarqdean.com
nlp4now.com
dunhillred.com
newenglandhemorrhoidclinic.com
kanpurshopee.com
hd279.com
micoshoppe.com
forst-holz.com
mobilehudini.com
vegasscheduler2.com
tonyezshop.com
dogaltrabzon.com
dermsin.xyz
Signatures
-
Formbook family
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/2640-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2640-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2640-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4044-31-0x0000000000C70000-0x0000000000C9E000-memory.dmp formbook behavioral2/memory/4044-36-0x0000000000C70000-0x0000000000C9E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2456 set thread context of 2640 2456 September Order 013.exe 98 PID 2640 set thread context of 3444 2640 September Order 013.exe 56 PID 2640 set thread context of 3444 2640 September Order 013.exe 56 PID 4044 set thread context of 3444 4044 msiexec.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language September Order 013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2640 September Order 013.exe 2640 September Order 013.exe 2640 September Order 013.exe 2640 September Order 013.exe 2640 September Order 013.exe 2640 September Order 013.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe 4044 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2640 September Order 013.exe 2640 September Order 013.exe 2640 September Order 013.exe 2640 September Order 013.exe 4044 msiexec.exe 4044 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2640 September Order 013.exe Token: SeDebugPrivilege 4044 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2640 2456 September Order 013.exe 98 PID 2456 wrote to memory of 2640 2456 September Order 013.exe 98 PID 2456 wrote to memory of 2640 2456 September Order 013.exe 98 PID 2456 wrote to memory of 2640 2456 September Order 013.exe 98 PID 2456 wrote to memory of 2640 2456 September Order 013.exe 98 PID 2456 wrote to memory of 2640 2456 September Order 013.exe 98 PID 3444 wrote to memory of 4044 3444 Explorer.EXE 100 PID 3444 wrote to memory of 4044 3444 Explorer.EXE 100 PID 3444 wrote to memory of 4044 3444 Explorer.EXE 100 PID 4044 wrote to memory of 1856 4044 msiexec.exe 101 PID 4044 wrote to memory of 1856 4044 msiexec.exe 101 PID 4044 wrote to memory of 1856 4044 msiexec.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\September Order 013.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-