Analysis
-
max time kernel
146s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
SKMBT_28324122512260.pdf.exe
Resource
win7-20240903-en
General
-
Target
SKMBT_28324122512260.pdf.exe
-
Size
1.3MB
-
MD5
00c66ed3dd9c5c71ff67ab6a4e3656e9
-
SHA1
a9522924477ac1c8c70e66a1ed007c23fb7e3028
-
SHA256
256de281ea46412e8c0743811da3d3075fb2ea1891125c1b055d5c0c01d1045f
-
SHA512
0cbb2fea2e8c485c80b522f4bcda11cd93e390d7237331c99334bccca5e7beeb90edfdd0122a20fb164a43a5aeb329e4a0d74b0bb979cc859fb23e58061dd391
-
SSDEEP
24576:ktb20pkaCqT5TBWgNQ7a++wVXSsJAzFfaeiwKyod/Qsb6A:NVg5tQ7a++wpSYgMei5yi/H5
Malware Config
Extracted
formbook
4.1
s94p
akeimpact.xyz
obsters.online
lsnmarketing.info
mm789.xyz
lack-loan-1232998.fyi
aaafsaneh1.info
nsurance-59975.bond
itricboost.cloud
0011997.xyz
st3jr71.world
winkletown3.store
imhell.cyou
nfluencer-marketing-72763.bond
etirement-plans-42889.bond
ugar-test-lab-near-me.today
llseasoncleaning.net
ksoftware.info
lientfirst.xyz
aatahmineh-inter5.rest
lsolutions.xyz
atellite-internet-61132.bond
aescalculadora.store
atemydashboard.online
oddaddy.online
ngridvault.xyz
epossessed-cars-36600.bond
mail-marketing-job-mogul.world
reudi.online
ymailserver.xyz
asyshop.game
hoes-footwear-11061.bond
opraise.store
alki.xyz
nline-advertising-16312.bond
rightwork.xyz
arvelads.house
ommunity-zen.net
seachallangermode.world
ompucim.tech
rdcast.net
laim-zrc-token.xyz
ental-implants-80206.bond
styvd.xyz
econdplace.xyz
gf777.win
warajyaevents.xyz
regnancy-41897.bond
hieldantivirus.store
h311u8e.xyz
om-exchange-nft275665.sbs
leaning-services-28292.bond
b188grab.xyz
idrift.net
oo.capital
ybelu.art
ibrationtransmitters.net
qnalh.info
ybervirus.fun
oresbyholdingslimited.net
arity.xyz
irwickstore.store
nelearn.xyz
xyab.shop
olimec.xyz
ift-5417190.live
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2300-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2300-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3000-14-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2672-2-0x0000000001140000-0x0000000001293000-memory.dmp autoit_exe behavioral1/memory/2672-4-0x0000000001140000-0x0000000001293000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2672 set thread context of 2300 2672 SKMBT_28324122512260.pdf.exe 30 PID 2300 set thread context of 1112 2300 svchost.exe 20 PID 3000 set thread context of 1112 3000 systray.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKMBT_28324122512260.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2300 svchost.exe 2300 svchost.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe 3000 systray.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2672 SKMBT_28324122512260.pdf.exe 2300 svchost.exe 2300 svchost.exe 2300 svchost.exe 3000 systray.exe 3000 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 svchost.exe Token: SeDebugPrivilege 3000 systray.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2672 SKMBT_28324122512260.pdf.exe 2672 SKMBT_28324122512260.pdf.exe 1112 Explorer.EXE 1112 Explorer.EXE 1112 Explorer.EXE 1112 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2672 SKMBT_28324122512260.pdf.exe 2672 SKMBT_28324122512260.pdf.exe 1112 Explorer.EXE 1112 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2300 2672 SKMBT_28324122512260.pdf.exe 30 PID 2672 wrote to memory of 2300 2672 SKMBT_28324122512260.pdf.exe 30 PID 2672 wrote to memory of 2300 2672 SKMBT_28324122512260.pdf.exe 30 PID 2672 wrote to memory of 2300 2672 SKMBT_28324122512260.pdf.exe 30 PID 2672 wrote to memory of 2300 2672 SKMBT_28324122512260.pdf.exe 30 PID 1112 wrote to memory of 3000 1112 Explorer.EXE 31 PID 1112 wrote to memory of 3000 1112 Explorer.EXE 31 PID 1112 wrote to memory of 3000 1112 Explorer.EXE 31 PID 1112 wrote to memory of 3000 1112 Explorer.EXE 31 PID 3000 wrote to memory of 2424 3000 systray.exe 32 PID 3000 wrote to memory of 2424 3000 systray.exe 32 PID 3000 wrote to memory of 2424 3000 systray.exe 32 PID 3000 wrote to memory of 2424 3000 systray.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\SKMBT_28324122512260.pdf.exe"C:\Users\Admin\AppData\Local\Temp\SKMBT_28324122512260.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\SKMBT_28324122512260.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-