Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 21:05
Static task
static1
Behavioral task
behavioral1
Sample
81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe
Resource
win7-20241010-en
General
-
Target
81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe
-
Size
1.8MB
-
MD5
ee81ac4809d750a020d8f5352660a3a9
-
SHA1
22539d8281651cdaecba74e69a26ec9339b42ca6
-
SHA256
81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06
-
SHA512
c113eef3a01cf0e341981c1f3c529d9d3e9d47e80b4a2c3854f099e2c4744a3b9225a41d53b5ed9d58dfc7a79cefa6b3006baa6b2a623dccbfeb340a1a4d2483
-
SSDEEP
24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8aXn40KXZJnSKc1VD4PZyvMKtoEHQzMSm:kTvC/MTQYxsWR7a34XXut8MvSu7
Malware Config
Extracted
formbook
4.1
mtpi
noriel.top
fast-profit.xyz
octominer.shop
perm-donor-unitedkingdom.today
techtalks.live
car-deals-83345.bond
aviso-pontos.net
luxmarty.online
signes.info
coinshift.finance
lanangkia.fun
outdoorpatioumbrellastore.shop
kvasilkov.dev
aviatorgamesplay.xyz
seeasalstcornwalls.shop
erdekescortg.xyz
binhminhhoamaiaqst.site
sumeyramodam.xyz
42825.club
agriroccella.com
sisiwerbaa1.online
bao-showbiz.info
2403dmc07.top
buycott.live
bd1ry22n.xyz
mavilleconnectee.motorcycles
81582.ooo
smarminds.xyz
belivsh.top
rty5621.xyz
samudrabet-merdeka4.asia
d26htg.vip
tybcq.rest
ductlessconditionsilt.bond
polistudyour.top
u888z.info
megasensa88.pro
envisionsuccess.info
freelancetravel.asia
ev5px.cyou
theshop.build
allinathletes.pro
kylanyaboke.tech
x63jv178ot.bond
business-software-13225.bond
product-tester-jobs-95135.bond
ra-postk.top
yftrfw34.cfd
789btrangchu.buzz
zfbjr.top
izza-tools.shop
lgdiamonds.kaufen
runlikezombie.icu
goldent.day
fitflopshop.club
online-advertising-11374.bond
chouse.cyou
digitaladvertising.buzz
icymelts.direct
serherseershjrre.buzz
22324002.xyz
dommalapati.shop
excavators-69165.bond
runchat.app
canadaspostn-postecanadasd.top
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/308-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/308-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2840-11-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2224 set thread context of 308 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 31 PID 308 set thread context of 1200 308 svchost.exe 21 PID 2840 set thread context of 1200 2840 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 308 svchost.exe 308 svchost.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe 2840 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 308 svchost.exe 308 svchost.exe 308 svchost.exe 2840 help.exe 2840 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 308 svchost.exe Token: SeDebugPrivilege 2840 help.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2224 wrote to memory of 308 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 31 PID 2224 wrote to memory of 308 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 31 PID 2224 wrote to memory of 308 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 31 PID 2224 wrote to memory of 308 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 31 PID 2224 wrote to memory of 308 2224 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 31 PID 1200 wrote to memory of 2840 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2840 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2840 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2840 1200 Explorer.EXE 32 PID 2840 wrote to memory of 2768 2840 help.exe 33 PID 2840 wrote to memory of 2768 2840 help.exe 33 PID 2840 wrote to memory of 2768 2840 help.exe 33 PID 2840 wrote to memory of 2768 2840 help.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe"C:\Users\Admin\AppData\Local\Temp\81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:308
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-