Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 06:23
Static task
static1
Behavioral task
behavioral1
Sample
pos.exe
Resource
win7-20241010-en
General
-
Target
pos.exe
-
Size
454KB
-
MD5
0082bb1c3ac5dc499f6db3d45de0ab3e
-
SHA1
90eb55324f4068a4fde1da25ca7a3eff65d17e1e
-
SHA256
1bb913d6f594107a8c8d4d64f9a3de85c602813d9ad93189b9949fbc8a93aa32
-
SHA512
e42c5af62527c2193d3f49f93918535b656f9d0a34065657df8273e606405b551e9f939450a134c20c58429951fbe7a27c14e19e66eeee57446349eaf7e30384
-
SSDEEP
6144:RT6Uqd2GhN5TebaT+hbE8BuXQ7NwHeOwvGOYLtXy00ynAWGyAu4mpwcFCLFjuShC:RmUi2iNtwBE0YOYLt7WDuZmo4juCueW
Malware Config
Extracted
formbook
4.1
u1bs
ln-safe-keepingmisva4.xyz
rtfh.xyz
awolin.link
metadlf.com
cardboardcasual.com
psicoterapiahablada.com
spaminator.xyz
hnjqzl.top
dentalyinovasi.site
biosynblas.com
zvyk.store
shreevishwakarmaservices.com
showersplash.com
norbert-roth.com
londoncapitaltraders.com
istanbuldonerkebabheroncity.com
realdiscountsnow.com
marlinplumbingwnc.com
magazinadziavane.com
qantv.com
redcardinaldaycare.com
fevxok.com
avp-travaux.com
spielload.com
countrymen.net
loverizzi.online
verbandverse.com
esssc.icu
thealphabrains.com
sleep-lab.pro
fancysquat.com
santasdasd.com
28ssc4.icu
gordonmicah.xyz
readyviewerone.com
242plaza.com
lc-kassel-kurhessen.com
guzram.com
classicitystudios.com
nextvoicetech.com
conectadoseventovirtual.com
chollz.xyz
sdxhbl.com
wilopumps.store
netshopsceilingfans.com
econiq.us
wisconsinfarmstay.com
pharmacie-plaideux.com
kppservices.com
cashprotectionservices.com
365bet356.com
davidandanabelsellshomes.com
bvfymca.net
kakvototakova.com
4bosses700mcc.com
topgamesimple.xyz
neistovo-veliko.online
vespafarmingdale.com
newmexicotitlesearches.com
dunnsdispatching.com
caldirectloans.com
taxitienthanh.com
marabout-serieux-rapide.com
oxygenglobal.net
vgmpradio.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2232-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2232-22-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2928-29-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1688 set thread context of 2232 1688 pos.exe 34 PID 2232 set thread context of 1272 2232 pos.exe 21 PID 2928 set thread context of 1272 2928 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1688 pos.exe 1688 pos.exe 2232 pos.exe 2232 pos.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2232 pos.exe 2232 pos.exe 2232 pos.exe 2928 svchost.exe 2928 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1688 pos.exe Token: SeDebugPrivilege 2232 pos.exe Token: SeDebugPrivilege 2928 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2832 1688 pos.exe 31 PID 1688 wrote to memory of 2832 1688 pos.exe 31 PID 1688 wrote to memory of 2832 1688 pos.exe 31 PID 1688 wrote to memory of 2832 1688 pos.exe 31 PID 1688 wrote to memory of 2804 1688 pos.exe 32 PID 1688 wrote to memory of 2804 1688 pos.exe 32 PID 1688 wrote to memory of 2804 1688 pos.exe 32 PID 1688 wrote to memory of 2804 1688 pos.exe 32 PID 1688 wrote to memory of 2232 1688 pos.exe 34 PID 1688 wrote to memory of 2232 1688 pos.exe 34 PID 1688 wrote to memory of 2232 1688 pos.exe 34 PID 1688 wrote to memory of 2232 1688 pos.exe 34 PID 1688 wrote to memory of 2232 1688 pos.exe 34 PID 1688 wrote to memory of 2232 1688 pos.exe 34 PID 1688 wrote to memory of 2232 1688 pos.exe 34 PID 1272 wrote to memory of 2928 1272 Explorer.EXE 35 PID 1272 wrote to memory of 2928 1272 Explorer.EXE 35 PID 1272 wrote to memory of 2928 1272 Explorer.EXE 35 PID 1272 wrote to memory of 2928 1272 Explorer.EXE 35 PID 2928 wrote to memory of 2688 2928 svchost.exe 36 PID 2928 wrote to memory of 2688 2928 svchost.exe 36 PID 2928 wrote to memory of 2688 2928 svchost.exe 36 PID 2928 wrote to memory of 2688 2928 svchost.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\pos.exe"C:\Users\Admin\AppData\Local\Temp\pos.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YAeSiES" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6C3B.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\pos.exe"C:\Users\Admin\AppData\Local\Temp\pos.exe"3⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\pos.exe"C:\Users\Admin\AppData\Local\Temp\pos.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\pos.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2688
-
-