Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
ETA BL PRO987659 FEDHL8998pdf.exe
Resource
win7-20241010-en
General
-
Target
ETA BL PRO987659 FEDHL8998pdf.exe
-
Size
1.0MB
-
MD5
36a044e6dd5a64160bed8d90f8cca6d3
-
SHA1
144e1408da99b2776249ecdb2bcf0bc259a2695c
-
SHA256
3a59a45b9ea6320db9a64910e02ea9d69419977c6dd5841752bae3b4fbbb661c
-
SHA512
256b902c0a8770ca51ecc4272e2c063c0d3131ee96c328411bd81851eeeef80126c09cc5e6abd3344b57d486bbb8ff2c2a6cce65d8696e41503e4fcf85e1a994
-
SSDEEP
24576:0Cdxte/80jYLT3U1jfsWaHQ7GKmkCuUHQ:lw80cTsjkWaHQ7VrCuN
Malware Config
Extracted
formbook
4.1
bn02
atoto.online
iberdata.xyz
irinevlerbombaci.xyz
ofas-district.world
ar-loans-35530.bond
heneapolis.city
istapro.shop
lectronics-engineering.cfd
pecoincopilot.xyz
ravelconverter.net
td0t.info
ifestylebonus.pro
v-finance.info
uenstigesofas.today
upiterassistant.xyz
vitance.digital
uperstash.xyz
ursing-home-43203.bond
uefana.biz
inegameyz.digital
martdrivecare.sbs
ootball-coaching-40064.bond
ecafecito.net
ollectors.legal
gents4b.online
nequaled-fang.shop
rodirectiveconsultinghq.info
nopickayo.biz
edopen.net
ersonaai.shop
89g.lol
eyond360.xyz
appyhere.net
aigeofsage.shop
eishininternationalava.shop
nventory-software-45680.bond
ohnnywilly.tech
777-dental-implants-au-204.cfd
reameast.live
gcitgvop.online
olominer.net
ovepeace-jp.net
ovesmaps.online
evmedia.info
akaz-1882.shop
acacovip.bet
ava.design
wiftloom.pics
htravel.net
nventory-software-91161.bond
fve88.win
arkettschleifen-dielen.online
ebatmalam.info
echstat.xyz
eet-new-people-88653.bond
eachassistant.xyz
ilybookstone.shop
enyore.community
cp.fun
m128.xyz
namensk.info
acercoffeecompanyava.shop
tarbeat-league.pro
xpat-health-insurance-ng.online
trongmindcheck.today
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2988-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2988-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1916-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2848 set thread context of 2988 2848 ETA BL PRO987659 FEDHL8998pdf.exe 30 PID 2988 set thread context of 1196 2988 svchost.exe 21 PID 1916 set thread context of 1196 1916 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ETA BL PRO987659 FEDHL8998pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2988 svchost.exe 2988 svchost.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe 1916 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2848 ETA BL PRO987659 FEDHL8998pdf.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 1916 help.exe 1916 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2988 svchost.exe Token: SeDebugPrivilege 1916 help.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2848 ETA BL PRO987659 FEDHL8998pdf.exe 2848 ETA BL PRO987659 FEDHL8998pdf.exe 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2848 ETA BL PRO987659 FEDHL8998pdf.exe 2848 ETA BL PRO987659 FEDHL8998pdf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2988 2848 ETA BL PRO987659 FEDHL8998pdf.exe 30 PID 2848 wrote to memory of 2988 2848 ETA BL PRO987659 FEDHL8998pdf.exe 30 PID 2848 wrote to memory of 2988 2848 ETA BL PRO987659 FEDHL8998pdf.exe 30 PID 2848 wrote to memory of 2988 2848 ETA BL PRO987659 FEDHL8998pdf.exe 30 PID 2848 wrote to memory of 2988 2848 ETA BL PRO987659 FEDHL8998pdf.exe 30 PID 1196 wrote to memory of 1916 1196 Explorer.EXE 31 PID 1196 wrote to memory of 1916 1196 Explorer.EXE 31 PID 1196 wrote to memory of 1916 1196 Explorer.EXE 31 PID 1196 wrote to memory of 1916 1196 Explorer.EXE 31 PID 1916 wrote to memory of 2748 1916 help.exe 32 PID 1916 wrote to memory of 2748 1916 help.exe 32 PID 1916 wrote to memory of 2748 1916 help.exe 32 PID 1916 wrote to memory of 2748 1916 help.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\ETA BL PRO987659 FEDHL8998pdf.exe"C:\Users\Admin\AppData\Local\Temp\ETA BL PRO987659 FEDHL8998pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ETA BL PRO987659 FEDHL8998pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-