Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
ETA BL PRO987659 FEDHL8998pdf.exe
Resource
win7-20241010-en
General
-
Target
ETA BL PRO987659 FEDHL8998pdf.exe
-
Size
1.0MB
-
MD5
36a044e6dd5a64160bed8d90f8cca6d3
-
SHA1
144e1408da99b2776249ecdb2bcf0bc259a2695c
-
SHA256
3a59a45b9ea6320db9a64910e02ea9d69419977c6dd5841752bae3b4fbbb661c
-
SHA512
256b902c0a8770ca51ecc4272e2c063c0d3131ee96c328411bd81851eeeef80126c09cc5e6abd3344b57d486bbb8ff2c2a6cce65d8696e41503e4fcf85e1a994
-
SSDEEP
24576:0Cdxte/80jYLT3U1jfsWaHQ7GKmkCuUHQ:lw80cTsjkWaHQ7VrCuN
Malware Config
Extracted
formbook
4.1
bn02
atoto.online
iberdata.xyz
irinevlerbombaci.xyz
ofas-district.world
ar-loans-35530.bond
heneapolis.city
istapro.shop
lectronics-engineering.cfd
pecoincopilot.xyz
ravelconverter.net
td0t.info
ifestylebonus.pro
v-finance.info
uenstigesofas.today
upiterassistant.xyz
vitance.digital
uperstash.xyz
ursing-home-43203.bond
uefana.biz
inegameyz.digital
martdrivecare.sbs
ootball-coaching-40064.bond
ecafecito.net
ollectors.legal
gents4b.online
nequaled-fang.shop
rodirectiveconsultinghq.info
nopickayo.biz
edopen.net
ersonaai.shop
89g.lol
eyond360.xyz
appyhere.net
aigeofsage.shop
eishininternationalava.shop
nventory-software-45680.bond
ohnnywilly.tech
777-dental-implants-au-204.cfd
reameast.live
gcitgvop.online
olominer.net
ovepeace-jp.net
ovesmaps.online
evmedia.info
akaz-1882.shop
acacovip.bet
ava.design
wiftloom.pics
htravel.net
nventory-software-91161.bond
fve88.win
arkettschleifen-dielen.online
ebatmalam.info
echstat.xyz
eet-new-people-88653.bond
eachassistant.xyz
ilybookstone.shop
enyore.community
cp.fun
m128.xyz
namensk.info
acercoffeecompanyava.shop
tarbeat-league.pro
xpat-health-insurance-ng.online
trongmindcheck.today
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4960-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4960-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4720-19-0x00000000003A0000-0x00000000003CF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1280 set thread context of 4960 1280 ETA BL PRO987659 FEDHL8998pdf.exe 89 PID 4960 set thread context of 3384 4960 svchost.exe 55 PID 4720 set thread context of 3384 4720 wscript.exe 55 -
Program crash 1 IoCs
pid pid_target Process procid_target 4572 1280 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ETA BL PRO987659 FEDHL8998pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4960 svchost.exe 4960 svchost.exe 4960 svchost.exe 4960 svchost.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe 4720 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3384 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1280 ETA BL PRO987659 FEDHL8998pdf.exe 4960 svchost.exe 4960 svchost.exe 4960 svchost.exe 4720 wscript.exe 4720 wscript.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4960 svchost.exe Token: SeShutdownPrivilege 3384 Explorer.EXE Token: SeCreatePagefilePrivilege 3384 Explorer.EXE Token: SeShutdownPrivilege 3384 Explorer.EXE Token: SeCreatePagefilePrivilege 3384 Explorer.EXE Token: SeDebugPrivilege 4720 wscript.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1280 ETA BL PRO987659 FEDHL8998pdf.exe 1280 ETA BL PRO987659 FEDHL8998pdf.exe 3384 Explorer.EXE 3384 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1280 ETA BL PRO987659 FEDHL8998pdf.exe 1280 ETA BL PRO987659 FEDHL8998pdf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3384 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4960 1280 ETA BL PRO987659 FEDHL8998pdf.exe 89 PID 1280 wrote to memory of 4960 1280 ETA BL PRO987659 FEDHL8998pdf.exe 89 PID 1280 wrote to memory of 4960 1280 ETA BL PRO987659 FEDHL8998pdf.exe 89 PID 1280 wrote to memory of 4960 1280 ETA BL PRO987659 FEDHL8998pdf.exe 89 PID 3384 wrote to memory of 4720 3384 Explorer.EXE 93 PID 3384 wrote to memory of 4720 3384 Explorer.EXE 93 PID 3384 wrote to memory of 4720 3384 Explorer.EXE 93 PID 4720 wrote to memory of 5284 4720 wscript.exe 99 PID 4720 wrote to memory of 5284 4720 wscript.exe 99 PID 4720 wrote to memory of 5284 4720 wscript.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\ETA BL PRO987659 FEDHL8998pdf.exe"C:\Users\Admin\AppData\Local\Temp\ETA BL PRO987659 FEDHL8998pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ETA BL PRO987659 FEDHL8998pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 6963⤵
- Program crash
PID:4572
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1280 -ip 12801⤵PID:4604