Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 19:28
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20240708-en
General
-
Target
download.exe
-
Size
181KB
-
MD5
794a509c76fc3641f14213e292cd2f96
-
SHA1
f714ddd2d33e9b819699b1988604c637d8883b09
-
SHA256
bcc71963343b162d9af725b69399e104ad4a9718ada6a764d3a0478500d96661
-
SHA512
5af28cc79606b82b1a8d60c2b22fecfc1c5a4e7b76f8df46b2d350657081c1fa937457a06f27d768b2ac47f6c8867ccfacc9b91e9e9002cabeb84d77b230a305
-
SSDEEP
3072:wpNDBJOQwi4pR0SsBeh9A9KoEjbhi/14fEMdSId8zOISCnmkJTV:+F+RpsUha9Knbhi/14fMIEhJnmS
Malware Config
Extracted
formbook
4.1
slpb
specialhelmets.com
advancedfiberglassproducts.com
guelphneurotraining.com
yishan1314.com
1728025.com
drawbeirut.com
bacb.online
calsury.com
health-helper.net
athapparels.com
kwunitedtraining.com
locqueenpl.com
kastamonuekingrup.com
planctheatreproject.com
puschistiki.com
mutlob.com
naturalbuttonecuador.com
smellssoclean.com
rishpure.com
weldvolt.com
best20onlinetherapy.com
kalilalashes.com
amrcanvas.com
anextrasetofhandsyyc.com
peripheralshubham.com
armyofoutcasts.com
neatdrop.com
viralnaekonomija.com
pgupcvbvyvjlja.pro
presupuestospublicos.com
energiaziemi.com
ribbonsofthought.com
contentgroups.com
rokupian.com
ivoireprotection.com
greenbarmiami.com
xn--yetkiliblgeservisi-k3b.com
alzxw.com
listingallauto.com
chipcenter.net
battagliafootwear.com
kelsonarts.com
cigarettes-on-line.com
planithomedesignstudio.com
doculine.net
princeofnaples.com
thirdagemojo.com
cimerkartaidatbasvurulari.com
idmcrack.xyz
vitalansweringservice.com
zimsmall.com
couldpronounced.life
biex-solutions.com
xn--dcktbzera5mu847cgbf.online
dteenpatti.com
sounds2dream.com
papayaapp.pro
dogwellfare.com
joe-mala.com
qimkoev.com
researchfarm.net
bandhcontractorsplus.com
trinitykaii.com
folanimon.com
czpls.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2252-2-0x00000000002D0000-0x00000000002FE000-memory.dmp formbook behavioral1/memory/2252-5-0x00000000002D0000-0x00000000002FE000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2252 set thread context of 1204 2252 download.exe 21 PID 2252 set thread context of 1204 2252 download.exe 21 PID 2772 set thread context of 1204 2772 colorcpl.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2252 download.exe 2252 download.exe 2252 download.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe 2772 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2252 download.exe 2252 download.exe 2252 download.exe 2252 download.exe 2772 colorcpl.exe 2772 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2252 download.exe Token: SeDebugPrivilege 2772 colorcpl.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2772 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2772 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2772 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2772 1204 Explorer.EXE 30 PID 2772 wrote to memory of 2784 2772 colorcpl.exe 31 PID 2772 wrote to memory of 2784 2772 colorcpl.exe 31 PID 2772 wrote to memory of 2784 2772 colorcpl.exe 31 PID 2772 wrote to memory of 2784 2772 colorcpl.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\download.exe"C:\Users\Admin\AppData\Local\Temp\download.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\download.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
-