Analysis
-
max time kernel
151s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 06:58
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER_pdf.exe
Resource
win7v20201028
General
-
Target
NEW ORDER_pdf.exe
-
Size
602KB
-
MD5
dc743359268cefe59904fa804112f012
-
SHA1
fcc10908413f0122fec5b19e15135957678c70d3
-
SHA256
3df48002a1199ab680bea952851cdc0a93f905f21d09245889d6332af639fe68
-
SHA512
8608789bd57073f65675ff160522fb29f771c6242d508ab0ca391ba22310ff030a1f40bcce5c79c1985c8ca05c3bb3528f488f6246d6d160dd4d152dad2b9752
Malware Config
Extracted
formbook
http://www.freshpixels.agency/wls/
brandcamapp.com
hotels-online.net
godsbaconjitters.com
renpaulhotpot.com
bikescarznguitarz.com
amelclothing.com
zhuqiuhui.space
theolivetreeonline.com
yizddmall.com
junkshoptheatre.com
smithylabs.com
cocokaraget.com
rayscollectibles.com
encinolandscapedesign.com
trzeks1.com
jstracker.net
cloudadventure.zone
emilyshines.com
exiledfg.com
seasisterscoastal.com
danishbilal.com
freisaq.com
namastewellnesscafe.com
internationalaid.global
basketballnewsandupdates.com
vagolfapparel.com
husainramadhan.com
gentlehumans.net
sushiburgersp.com
xfinitycomcasts.com
mybestprinting.com
truckshowofficial.com
consultationindustries.com
mortgage954.com
anaisburrows.online
dukespsychologicalsupports.com
ambient.business
sergesturkishbarber.com
bobkuhn4h2o.com
proline.site
choosingwanderlust.com
runningxtreme.club
grupoecosana.com
cntmdts.com
pcstrategiesva.com
beyoutifulkuw.com
thearcadela.net
weilaitong.net
madorikun.net
kingscoldbrews.com
sindaen.com
lookouttribe.com
timfaganphotography.com
hybrid-veranstaltungen.com
vonryman.com
hhewen.com
024mtp.com
xvault.net
betwox.com
cyclingsunglassestop.com
acselleron.com
elapseachieve.xyz
timthonailonline.com
puertoricoartsandcrafts.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1688-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1688-8-0x000000000041EBD0-mapping.dmp formbook behavioral1/memory/1096-9-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 592 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
NEW ORDER_pdf.exeNEW ORDER_pdf.exechkdsk.exedescription pid process target process PID 1744 set thread context of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1688 set thread context of 1268 1688 NEW ORDER_pdf.exe Explorer.EXE PID 1688 set thread context of 1268 1688 NEW ORDER_pdf.exe Explorer.EXE PID 1096 set thread context of 1268 1096 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
NEW ORDER_pdf.exechkdsk.exepid process 1688 NEW ORDER_pdf.exe 1688 NEW ORDER_pdf.exe 1688 NEW ORDER_pdf.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe 1096 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
NEW ORDER_pdf.exechkdsk.exepid process 1688 NEW ORDER_pdf.exe 1688 NEW ORDER_pdf.exe 1688 NEW ORDER_pdf.exe 1688 NEW ORDER_pdf.exe 1096 chkdsk.exe 1096 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
NEW ORDER_pdf.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1688 NEW ORDER_pdf.exe Token: SeDebugPrivilege 1096 chkdsk.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
NEW ORDER_pdf.exeExplorer.EXEchkdsk.exedescription pid process target process PID 1744 wrote to memory of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1744 wrote to memory of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1744 wrote to memory of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1744 wrote to memory of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1744 wrote to memory of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1744 wrote to memory of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1744 wrote to memory of 1688 1744 NEW ORDER_pdf.exe NEW ORDER_pdf.exe PID 1268 wrote to memory of 1096 1268 Explorer.EXE chkdsk.exe PID 1268 wrote to memory of 1096 1268 Explorer.EXE chkdsk.exe PID 1268 wrote to memory of 1096 1268 Explorer.EXE chkdsk.exe PID 1268 wrote to memory of 1096 1268 Explorer.EXE chkdsk.exe PID 1096 wrote to memory of 592 1096 chkdsk.exe cmd.exe PID 1096 wrote to memory of 592 1096 chkdsk.exe cmd.exe PID 1096 wrote to memory of 592 1096 chkdsk.exe cmd.exe PID 1096 wrote to memory of 592 1096 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER_pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/592-11-0x0000000000000000-mapping.dmp
-
memory/1096-9-0x0000000000000000-mapping.dmp
-
memory/1096-10-0x0000000000D40000-0x0000000000D47000-memory.dmpFilesize
28KB
-
memory/1096-12-0x0000000000B50000-0x0000000000C28000-memory.dmpFilesize
864KB
-
memory/1688-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1688-8-0x000000000041EBD0-mapping.dmp
-
memory/1744-2-0x00000000741A0000-0x000000007488E000-memory.dmpFilesize
6.9MB
-
memory/1744-3-0x0000000000FA0000-0x0000000000FA1000-memory.dmpFilesize
4KB
-
memory/1744-5-0x0000000000670000-0x000000000067E000-memory.dmpFilesize
56KB
-
memory/1744-6-0x0000000005040000-0x00000000050C0000-memory.dmpFilesize
512KB