Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
PO 211208-0211A.exe
Resource
win7-20241010-en
General
-
Target
PO 211208-0211A.exe
-
Size
1.0MB
-
MD5
4932a1d01ae69c90fa06963bfb368884
-
SHA1
8ffbda9ba7d5d81ca7ca3714ef84f272181192cd
-
SHA256
55d83cadb3eaa23b65912739a821a03a28186b5759528e1038a46c113db28614
-
SHA512
22d5b1470939ff871eefd1be57837af61beb5a9e59a6b5b156fb8067de377430b4419d90f593a72d6faffb4c9d09adf8081623f97cd7af8f5fe1a27173e87cf3
-
SSDEEP
24576:X3ddXRqVJYmmjuIgAUIMN3AkbNjegVn67zK86/hgI:7zuTge3z560mu8CeI
Malware Config
Extracted
formbook
4.1
kz21
affordableshopper.com
federalpensioneducation.com
nguyenphuc.xyz
tbryantnotarysvcs.com
satgerv.online
yis.xyz
sailing-dreams.online
saairconditioners.com
compassioncommunity.net
vickyrubs.com
uniqueprorental.com
xplus-main.xyz
beforetravelthai.com
mentaltrainer.net
bianko.xyz
postsandnews.com
stream-king.com
citizen.guide
lasuiterennes.com
elektroexpress24.com
kolkatanewspaper.xyz
digitalstore.space
konglish.xyz
cultureangel.com
carelegend.com
illuminategodslove.com
realisatiedomein3.com
homes62.com
leapsoffaithwaterskiers.com
shihuod.com
masteknoloji.net
vifi-web.com
winchesterstablesofvermont.com
theholdscarborough.com
sf9oh3.net
usdbet797.com
economiareale.info
gearinternetdeals.com
new-carbuycrossoversuv.website
losconquistadoreshotel.com
storetees.art
hotelkompendium.com
hohmbathhouse.com
graviitycloud.online
mewstralia.com
domesticelectriciankent.com
rentalserver-kurabe.com
jrkennington.com
register-coinex.online
iywin.com
laviniaribeiro.site
lorodicahmdpa22.xyz
mebelrosso.com
topratedales.com
kastyelie.xyz
weeventos.com
szefrxsa.xyz
fyuc.info
competition-malachite.com
onlinebatch.space
ida-info.com
fakeituntil.com
lm-safe-keepingmdpa22.xyz
tammooz.site
cingetkuiert.xyz
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2868-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2868-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2868-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3100-28-0x0000000000CA0000-0x0000000000CCF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1968 set thread context of 2868 1968 PO 211208-0211A.exe 92 PID 2868 set thread context of 3448 2868 PO 211208-0211A.exe 56 PID 2868 set thread context of 3448 2868 PO 211208-0211A.exe 56 PID 3100 set thread context of 3448 3100 svchost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO 211208-0211A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1968 PO 211208-0211A.exe 1968 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 2868 PO 211208-0211A.exe 3100 svchost.exe 3100 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1968 PO 211208-0211A.exe Token: SeDebugPrivilege 2868 PO 211208-0211A.exe Token: SeDebugPrivilege 3100 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3184 1968 PO 211208-0211A.exe 91 PID 1968 wrote to memory of 3184 1968 PO 211208-0211A.exe 91 PID 1968 wrote to memory of 3184 1968 PO 211208-0211A.exe 91 PID 1968 wrote to memory of 2868 1968 PO 211208-0211A.exe 92 PID 1968 wrote to memory of 2868 1968 PO 211208-0211A.exe 92 PID 1968 wrote to memory of 2868 1968 PO 211208-0211A.exe 92 PID 1968 wrote to memory of 2868 1968 PO 211208-0211A.exe 92 PID 1968 wrote to memory of 2868 1968 PO 211208-0211A.exe 92 PID 1968 wrote to memory of 2868 1968 PO 211208-0211A.exe 92 PID 3448 wrote to memory of 3100 3448 Explorer.EXE 93 PID 3448 wrote to memory of 3100 3448 Explorer.EXE 93 PID 3448 wrote to memory of 3100 3448 Explorer.EXE 93 PID 3100 wrote to memory of 944 3100 svchost.exe 94 PID 3100 wrote to memory of 944 3100 svchost.exe 94 PID 3100 wrote to memory of 944 3100 svchost.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"3⤵PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO 211208-0211A.exe"3⤵
- System Location Discovery: System Language Discovery
PID:944
-
-