Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
PO 211208-0211A.exe
Resource
win7-20241010-en
General
-
Target
PO 211208-0211A.exe
-
Size
1.0MB
-
MD5
4932a1d01ae69c90fa06963bfb368884
-
SHA1
8ffbda9ba7d5d81ca7ca3714ef84f272181192cd
-
SHA256
55d83cadb3eaa23b65912739a821a03a28186b5759528e1038a46c113db28614
-
SHA512
22d5b1470939ff871eefd1be57837af61beb5a9e59a6b5b156fb8067de377430b4419d90f593a72d6faffb4c9d09adf8081623f97cd7af8f5fe1a27173e87cf3
-
SSDEEP
24576:X3ddXRqVJYmmjuIgAUIMN3AkbNjegVn67zK86/hgI:7zuTge3z560mu8CeI
Malware Config
Extracted
formbook
4.1
kz21
affordableshopper.com
federalpensioneducation.com
nguyenphuc.xyz
tbryantnotarysvcs.com
satgerv.online
yis.xyz
sailing-dreams.online
saairconditioners.com
compassioncommunity.net
vickyrubs.com
uniqueprorental.com
xplus-main.xyz
beforetravelthai.com
mentaltrainer.net
bianko.xyz
postsandnews.com
stream-king.com
citizen.guide
lasuiterennes.com
elektroexpress24.com
kolkatanewspaper.xyz
digitalstore.space
konglish.xyz
cultureangel.com
carelegend.com
illuminategodslove.com
realisatiedomein3.com
homes62.com
leapsoffaithwaterskiers.com
shihuod.com
masteknoloji.net
vifi-web.com
winchesterstablesofvermont.com
theholdscarborough.com
sf9oh3.net
usdbet797.com
economiareale.info
gearinternetdeals.com
new-carbuycrossoversuv.website
losconquistadoreshotel.com
storetees.art
hotelkompendium.com
hohmbathhouse.com
graviitycloud.online
mewstralia.com
domesticelectriciankent.com
rentalserver-kurabe.com
jrkennington.com
register-coinex.online
iywin.com
laviniaribeiro.site
lorodicahmdpa22.xyz
mebelrosso.com
topratedales.com
kastyelie.xyz
weeventos.com
szefrxsa.xyz
fyuc.info
competition-malachite.com
onlinebatch.space
ida-info.com
fakeituntil.com
lm-safe-keepingmdpa22.xyz
tammooz.site
cingetkuiert.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2920-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2920-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2828-22-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2552 set thread context of 2920 2552 PO 211208-0211A.exe 30 PID 2920 set thread context of 1256 2920 PO 211208-0211A.exe 21 PID 2828 set thread context of 1256 2828 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO 211208-0211A.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2920 PO 211208-0211A.exe 2920 PO 211208-0211A.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe 2828 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2920 PO 211208-0211A.exe 2920 PO 211208-0211A.exe 2920 PO 211208-0211A.exe 2828 wlanext.exe 2828 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2920 PO 211208-0211A.exe Token: SeDebugPrivilege 2828 wlanext.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2920 2552 PO 211208-0211A.exe 30 PID 2552 wrote to memory of 2920 2552 PO 211208-0211A.exe 30 PID 2552 wrote to memory of 2920 2552 PO 211208-0211A.exe 30 PID 2552 wrote to memory of 2920 2552 PO 211208-0211A.exe 30 PID 2552 wrote to memory of 2920 2552 PO 211208-0211A.exe 30 PID 2552 wrote to memory of 2920 2552 PO 211208-0211A.exe 30 PID 2552 wrote to memory of 2920 2552 PO 211208-0211A.exe 30 PID 1256 wrote to memory of 2828 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2828 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2828 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2828 1256 Explorer.EXE 31 PID 2828 wrote to memory of 2760 2828 wlanext.exe 32 PID 2828 wrote to memory of 2760 2828 wlanext.exe 32 PID 2828 wrote to memory of 2760 2828 wlanext.exe 32 PID 2828 wrote to memory of 2760 2828 wlanext.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-