Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 08:50
Static task
static1
Behavioral task
behavioral1
Sample
SKMBT_28324122512260.pdf.exe
Resource
win7-20240903-en
General
-
Target
SKMBT_28324122512260.pdf.exe
-
Size
1.3MB
-
MD5
00c66ed3dd9c5c71ff67ab6a4e3656e9
-
SHA1
a9522924477ac1c8c70e66a1ed007c23fb7e3028
-
SHA256
256de281ea46412e8c0743811da3d3075fb2ea1891125c1b055d5c0c01d1045f
-
SHA512
0cbb2fea2e8c485c80b522f4bcda11cd93e390d7237331c99334bccca5e7beeb90edfdd0122a20fb164a43a5aeb329e4a0d74b0bb979cc859fb23e58061dd391
-
SSDEEP
24576:ktb20pkaCqT5TBWgNQ7a++wVXSsJAzFfaeiwKyod/Qsb6A:NVg5tQ7a++wpSYgMei5yi/H5
Malware Config
Extracted
formbook
4.1
s94p
akeimpact.xyz
obsters.online
lsnmarketing.info
mm789.xyz
lack-loan-1232998.fyi
aaafsaneh1.info
nsurance-59975.bond
itricboost.cloud
0011997.xyz
st3jr71.world
winkletown3.store
imhell.cyou
nfluencer-marketing-72763.bond
etirement-plans-42889.bond
ugar-test-lab-near-me.today
llseasoncleaning.net
ksoftware.info
lientfirst.xyz
aatahmineh-inter5.rest
lsolutions.xyz
atellite-internet-61132.bond
aescalculadora.store
atemydashboard.online
oddaddy.online
ngridvault.xyz
epossessed-cars-36600.bond
mail-marketing-job-mogul.world
reudi.online
ymailserver.xyz
asyshop.game
hoes-footwear-11061.bond
opraise.store
alki.xyz
nline-advertising-16312.bond
rightwork.xyz
arvelads.house
ommunity-zen.net
seachallangermode.world
ompucim.tech
rdcast.net
laim-zrc-token.xyz
ental-implants-80206.bond
styvd.xyz
econdplace.xyz
gf777.win
warajyaevents.xyz
regnancy-41897.bond
hieldantivirus.store
h311u8e.xyz
om-exchange-nft275665.sbs
leaning-services-28292.bond
b188grab.xyz
idrift.net
oo.capital
ybelu.art
ibrationtransmitters.net
qnalh.info
ybervirus.fun
oresbyholdingslimited.net
arity.xyz
irwickstore.store
nelearn.xyz
xyab.shop
olimec.xyz
ift-5417190.live
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4648-3-0x00000000004A0000-0x00000000004CF000-memory.dmp formbook behavioral2/memory/4648-7-0x00000000004A0000-0x00000000004CF000-memory.dmp formbook behavioral2/memory/4648-11-0x00000000004A0000-0x00000000004CF000-memory.dmp formbook behavioral2/memory/4664-18-0x0000000000F40000-0x0000000000F6F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3016 set thread context of 4648 3016 SKMBT_28324122512260.pdf.exe 83 PID 4648 set thread context of 3520 4648 svchost.exe 56 PID 4648 set thread context of 3520 4648 svchost.exe 56 PID 4664 set thread context of 3520 4664 WWAHost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKMBT_28324122512260.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4648 svchost.exe 4648 svchost.exe 4648 svchost.exe 4648 svchost.exe 4648 svchost.exe 4648 svchost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe 4664 WWAHost.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3016 SKMBT_28324122512260.pdf.exe 3016 SKMBT_28324122512260.pdf.exe 4648 svchost.exe 4648 svchost.exe 4648 svchost.exe 4648 svchost.exe 4664 WWAHost.exe 4664 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4648 svchost.exe Token: SeDebugPrivilege 4664 WWAHost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3016 SKMBT_28324122512260.pdf.exe 3016 SKMBT_28324122512260.pdf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3016 SKMBT_28324122512260.pdf.exe 3016 SKMBT_28324122512260.pdf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4648 3016 SKMBT_28324122512260.pdf.exe 83 PID 3016 wrote to memory of 4648 3016 SKMBT_28324122512260.pdf.exe 83 PID 3016 wrote to memory of 4648 3016 SKMBT_28324122512260.pdf.exe 83 PID 3016 wrote to memory of 4648 3016 SKMBT_28324122512260.pdf.exe 83 PID 3520 wrote to memory of 4664 3520 Explorer.EXE 93 PID 3520 wrote to memory of 4664 3520 Explorer.EXE 93 PID 3520 wrote to memory of 4664 3520 Explorer.EXE 93 PID 4664 wrote to memory of 1896 4664 WWAHost.exe 98 PID 4664 wrote to memory of 1896 4664 WWAHost.exe 98 PID 4664 wrote to memory of 1896 4664 WWAHost.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\SKMBT_28324122512260.pdf.exe"C:\Users\Admin\AppData\Local\Temp\SKMBT_28324122512260.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\SKMBT_28324122512260.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-