Analysis
-
max time kernel
150s -
max time network
21s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 20:03
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER_pdf.exe
Resource
win7v20201028
General
-
Target
NEW ORDER_pdf.exe
-
Size
895KB
-
MD5
8e1ad5c73d1b372892f6c15df6bf9ccd
-
SHA1
3a48d338e78b76d76beb124a1b51f53950a2da17
-
SHA256
7ca6fd35f23ebe9ef2a3dc7a1d6e95fa1569a80eff9987e2b4126c3b757aabda
-
SHA512
0915102ee77a2115399e86699c5bf9fd5d51322d39c212cd3ee7c917d20c7d258f1bc9b6ea358f2f10ef36dae63f2104ee75b72c4b883d08befbc3f7ea27c53b
Malware Config
Extracted
formbook
http://www.freshpixels.agency/wls/
brandcamapp.com
hotels-online.net
godsbaconjitters.com
renpaulhotpot.com
bikescarznguitarz.com
amelclothing.com
zhuqiuhui.space
theolivetreeonline.com
yizddmall.com
junkshoptheatre.com
smithylabs.com
cocokaraget.com
rayscollectibles.com
encinolandscapedesign.com
trzeks1.com
jstracker.net
cloudadventure.zone
emilyshines.com
exiledfg.com
seasisterscoastal.com
danishbilal.com
freisaq.com
namastewellnesscafe.com
internationalaid.global
basketballnewsandupdates.com
vagolfapparel.com
husainramadhan.com
gentlehumans.net
sushiburgersp.com
xfinitycomcasts.com
mybestprinting.com
truckshowofficial.com
consultationindustries.com
mortgage954.com
anaisburrows.online
dukespsychologicalsupports.com
ambient.business
sergesturkishbarber.com
bobkuhn4h2o.com
proline.site
choosingwanderlust.com
runningxtreme.club
grupoecosana.com
cntmdts.com
pcstrategiesva.com
beyoutifulkuw.com
thearcadela.net
weilaitong.net
madorikun.net
kingscoldbrews.com
sindaen.com
lookouttribe.com
timfaganphotography.com
hybrid-veranstaltungen.com
vonryman.com
hhewen.com
024mtp.com
xvault.net
betwox.com
cyclingsunglassestop.com
acselleron.com
elapseachieve.xyz
timthonailonline.com
puertoricoartsandcrafts.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1540-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1540-8-0x000000000041EBD0-mapping.dmp formbook behavioral1/memory/1564-9-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 324 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
NEW ORDER_pdf.exeNEW ORDER_pdf.exemstsc.exedescription pid process target process PID 1204 set thread context of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1540 set thread context of 1220 1540 NEW ORDER_pdf.exe Explorer.EXE PID 1540 set thread context of 1220 1540 NEW ORDER_pdf.exe Explorer.EXE PID 1564 set thread context of 1220 1564 mstsc.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
NEW ORDER_pdf.exemstsc.exepid process 1540 NEW ORDER_pdf.exe 1540 NEW ORDER_pdf.exe 1540 NEW ORDER_pdf.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe 1564 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
NEW ORDER_pdf.exemstsc.exepid process 1540 NEW ORDER_pdf.exe 1540 NEW ORDER_pdf.exe 1540 NEW ORDER_pdf.exe 1540 NEW ORDER_pdf.exe 1564 mstsc.exe 1564 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
NEW ORDER_pdf.exemstsc.exedescription pid process Token: SeDebugPrivilege 1540 NEW ORDER_pdf.exe Token: SeDebugPrivilege 1564 mstsc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
NEW ORDER_pdf.exeExplorer.EXEmstsc.exedescription pid process target process PID 1204 wrote to memory of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1204 wrote to memory of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1204 wrote to memory of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1204 wrote to memory of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1204 wrote to memory of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1204 wrote to memory of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1204 wrote to memory of 1540 1204 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1220 wrote to memory of 1564 1220 Explorer.EXE mstsc.exe PID 1220 wrote to memory of 1564 1220 Explorer.EXE mstsc.exe PID 1220 wrote to memory of 1564 1220 Explorer.EXE mstsc.exe PID 1220 wrote to memory of 1564 1220 Explorer.EXE mstsc.exe PID 1564 wrote to memory of 324 1564 mstsc.exe cmd.exe PID 1564 wrote to memory of 324 1564 mstsc.exe cmd.exe PID 1564 wrote to memory of 324 1564 mstsc.exe cmd.exe PID 1564 wrote to memory of 324 1564 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"3⤵
- Deletes itself
PID:324
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/324-11-0x0000000000000000-mapping.dmp
-
memory/1204-2-0x00000000740B0000-0x000000007479E000-memory.dmpFilesize
6.9MB
-
memory/1204-3-0x0000000000C40000-0x0000000000C41000-memory.dmpFilesize
4KB
-
memory/1204-5-0x0000000000260000-0x000000000026E000-memory.dmpFilesize
56KB
-
memory/1204-6-0x00000000078C0000-0x0000000007952000-memory.dmpFilesize
584KB
-
memory/1540-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1540-8-0x000000000041EBD0-mapping.dmp
-
memory/1564-9-0x0000000000000000-mapping.dmp
-
memory/1564-10-0x0000000000860000-0x0000000000964000-memory.dmpFilesize
1.0MB
-
memory/1564-12-0x00000000031C0000-0x000000000327A000-memory.dmpFilesize
744KB