Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 03:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.PWSX-gen.15104.7180.exe
Resource
win7-20240903-en
General
-
Target
SecuriteInfo.com.PWSX-gen.15104.7180.exe
-
Size
935KB
-
MD5
6030be9effde524bcdbcf14ec05ca651
-
SHA1
6d0b6bba281ed8ae9c9b8b9bc53f34b721608400
-
SHA256
762bfb4d60c0f58658f0f04470856ae4305c4d1f7d1f3fb9c053cbb5f15fd57e
-
SHA512
003064eac5edebf4c011e6272734881d440285df3ab3248b8b499b2ba52ca866e0600101ed9874b28abd16ee046068b1c28d3d2a256bee542d736f5fe0885396
-
SSDEEP
12288:4AbsbLgqUZsCHbn1VBbRj+PWIdEeM73Itc8Dulwg32EiylMBnfU2J96i:3mgfZV5bQ+eM7125yGzHZ
Malware Config
Extracted
formbook
4.1
i62s
uamentesaudavel.shop
nio.xyz
rginine12.live
ourmet94goodies.shop
dveo.xyz
epp.xyz
lexbreus.art
nline-gaming-32533.bond
znetio.info
hosaround.net
ecurity-apps-53798.bond
treamtiendat.xyz
ngomoney.online
wig.xyz
ills-au.today
megavine.shop
hatsea.net
nvestore.xyz
pasupplies.online
i-analyst.online
olos.fun
mmfedex.online
utterinstallationmiamifl.net
ontenhiburan.lat
lataoplomo.shop
iliarslot77.club
eusx.xyz
astebud.xyz
imaopro.shop
icovideo.motorcycles
hees.xyz
uajialihan.net
mbags.online
ytsxv.xyz
pps-88306.bond
urnuiet.biz
lute.xyz
kds.store
nstaplan.xyz
orezenpulse.ltd
elfast-cruisetours.today
kohtom486.vip
65six6.shop
imelightbeauty.store
5469.vip
utomation-tools-31065.bond
lassical.fun
oridion.net
ir49.buzz
irrwrsr.icu
aco4dkuy.online
owden.zone
lotbonus.xyz
udoudou.fun
nkomega.shop
dbgtv.info
owardhammerpleasure35.sbs
iirv.bid
rosperityconsultinggroup.net
rediksi-lexitoto.art
v02.net
ind-singles3.live
est-sellers.net
rmaossoares.shop
arehouse-inventory-97550.bond
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2828-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2828-18-0x00000000008C0000-0x0000000000BC3000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.PWSX-gen.15104.7180.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 2828 SecuriteInfo.com.PWSX-gen.15104.7180.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2812 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 31 PID 3040 wrote to memory of 2812 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 31 PID 3040 wrote to memory of 2812 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 31 PID 3040 wrote to memory of 2812 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 31 PID 3040 wrote to memory of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32 PID 3040 wrote to memory of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32 PID 3040 wrote to memory of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32 PID 3040 wrote to memory of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32 PID 3040 wrote to memory of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32 PID 3040 wrote to memory of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32 PID 3040 wrote to memory of 2828 3040 SecuriteInfo.com.PWSX-gen.15104.7180.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PWSX-gen.15104.7180.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PWSX-gen.15104.7180.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PWSX-gen.15104.7180.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PWSX-gen.15104.7180.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PWSX-gen.15104.7180.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PWSX-gen.15104.7180.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-