Analysis
-
max time kernel
148s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-04-2021 06:53
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER ELO-05756485.exe
Resource
win7v20201028
General
-
Target
NEW ORDER ELO-05756485.exe
-
Size
528KB
-
MD5
ef847f9fc2339b9470150fef1105b5fe
-
SHA1
eb9b2c97525c2b167d1ae4bdeba308f1c4d9206d
-
SHA256
9e54241184e45b1950037313896e0d2e864cc9d373f5a2f14b0af405094fd1a4
-
SHA512
ea26bb55d9d79ca887b184b71746328e65b06b24d701d7856f6f416a1fc93f750580b68a8204b30eb94dabc9e899e4baf4358f23ef5ce7ea23308369b5be4c10
Malware Config
Extracted
formbook
4.1
http://www.dingolope.com/riai/
856380892.xyz
goproteinz.com
girigratis.com
4schwuleautoren.com
artofwrestlingicons.com
miles4moms.com
tamiigun.com
noritamoneyconsultants.net
blacklionllc.net
elevictory.com
happinessmail.com
thymocide.net
123goimmo.com
advocate4deaf.com
lovelyforum.net
rentlondonapartment.com
weinsureplanes.com
tagfqjxf.icu
thewellbeingsutra.com
enibo-official.com
gammacake.com
flyingshiitake.com
heryay.com
myonlinereturns.com
goodxweb.com
soukefu.com
stuntmemorabilia.net
ourlivesinchristmatters.com
capslock-europe.com
trannghiason.com
makeproductcool.com
siezubehor.com
architeizer.com
smartwisecapital.info
mybuildingneeds.com
jumlasx.xyz
theclevergoalie.com
polvodeoro.com
wheretofindmarina.com
learningfitbit.com
buyanijuan.com
aplusdrilling.com
dulcification-comforter.info
bjkjrd.com
dehaochu.com
jaceandjenelle.com
upperish.com
asociadosresidenciales.com
timedoesnote082703.xyz
hackinson.com
3d3366.com
harringtonstoowoomba.com
amandawilsonsolutions.com
skipbinsplus.com
plataformacampeao.com
sleepasana.com
pinupcasino-start.site
chamosgt.com
3pisbd.com
yourbesttacolife.com
synaptictalent.com
controlservicesreport.com
westrenworld.com
watertomato.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/400-11-0x000000000041ED30-mapping.dmp formbook behavioral1/memory/400-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/624-22-0x0000000000110000-0x000000000013E000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 988 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
NEW ORDER ELO-05756485.exeNEW ORDER ELO-05756485.exerundll32.exedescription pid process target process PID 1932 set thread context of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 400 set thread context of 1260 400 NEW ORDER ELO-05756485.exe Explorer.EXE PID 400 set thread context of 1260 400 NEW ORDER ELO-05756485.exe Explorer.EXE PID 624 set thread context of 1260 624 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
NEW ORDER ELO-05756485.exeNEW ORDER ELO-05756485.exerundll32.exepid process 1932 NEW ORDER ELO-05756485.exe 1932 NEW ORDER ELO-05756485.exe 1932 NEW ORDER ELO-05756485.exe 400 NEW ORDER ELO-05756485.exe 400 NEW ORDER ELO-05756485.exe 400 NEW ORDER ELO-05756485.exe 624 rundll32.exe 624 rundll32.exe 624 rundll32.exe 624 rundll32.exe 624 rundll32.exe 624 rundll32.exe 624 rundll32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
NEW ORDER ELO-05756485.exerundll32.exepid process 400 NEW ORDER ELO-05756485.exe 400 NEW ORDER ELO-05756485.exe 400 NEW ORDER ELO-05756485.exe 400 NEW ORDER ELO-05756485.exe 624 rundll32.exe 624 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
NEW ORDER ELO-05756485.exeNEW ORDER ELO-05756485.exerundll32.exedescription pid process Token: SeDebugPrivilege 1932 NEW ORDER ELO-05756485.exe Token: SeDebugPrivilege 400 NEW ORDER ELO-05756485.exe Token: SeDebugPrivilege 624 rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
NEW ORDER ELO-05756485.exeExplorer.EXErundll32.exedescription pid process target process PID 1932 wrote to memory of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1932 wrote to memory of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1932 wrote to memory of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1932 wrote to memory of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1932 wrote to memory of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1932 wrote to memory of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1932 wrote to memory of 400 1932 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1260 wrote to memory of 624 1260 Explorer.EXE rundll32.exe PID 1260 wrote to memory of 624 1260 Explorer.EXE rundll32.exe PID 1260 wrote to memory of 624 1260 Explorer.EXE rundll32.exe PID 1260 wrote to memory of 624 1260 Explorer.EXE rundll32.exe PID 1260 wrote to memory of 624 1260 Explorer.EXE rundll32.exe PID 1260 wrote to memory of 624 1260 Explorer.EXE rundll32.exe PID 1260 wrote to memory of 624 1260 Explorer.EXE rundll32.exe PID 624 wrote to memory of 988 624 rundll32.exe cmd.exe PID 624 wrote to memory of 988 624 rundll32.exe cmd.exe PID 624 wrote to memory of 988 624 rundll32.exe cmd.exe PID 624 wrote to memory of 988 624 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/400-16-0x0000000000260000-0x0000000000274000-memory.dmpFilesize
80KB
-
memory/400-11-0x000000000041ED30-mapping.dmp
-
memory/400-10-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/400-13-0x0000000000810000-0x0000000000B13000-memory.dmpFilesize
3.0MB
-
memory/400-15-0x0000000000220000-0x0000000000234000-memory.dmpFilesize
80KB
-
memory/624-24-0x0000000000A80000-0x0000000000B13000-memory.dmpFilesize
588KB
-
memory/624-23-0x0000000002310000-0x0000000002613000-memory.dmpFilesize
3.0MB
-
memory/624-22-0x0000000000110000-0x000000000013E000-memory.dmpFilesize
184KB
-
memory/624-21-0x0000000000F00000-0x0000000000F0E000-memory.dmpFilesize
56KB
-
memory/624-19-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/624-18-0x0000000000000000-mapping.dmp
-
memory/988-20-0x0000000000000000-mapping.dmp
-
memory/1260-14-0x00000000074A0000-0x000000000764D000-memory.dmpFilesize
1.7MB
-
memory/1260-17-0x0000000007650000-0x000000000779F000-memory.dmpFilesize
1.3MB
-
memory/1932-2-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/1932-9-0x0000000000750000-0x0000000000783000-memory.dmpFilesize
204KB
-
memory/1932-8-0x0000000005340000-0x00000000053B5000-memory.dmpFilesize
468KB
-
memory/1932-7-0x000000007EF40000-0x000000007EF41000-memory.dmpFilesize
4KB
-
memory/1932-6-0x0000000000490000-0x0000000000494000-memory.dmpFilesize
16KB
-
memory/1932-5-0x00000000004A0000-0x00000000004A1000-memory.dmpFilesize
4KB
-
memory/1932-3-0x00000000013A0000-0x00000000013A1000-memory.dmpFilesize
4KB