Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-04-2021 06:53
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER ELO-05756485.exe
Resource
win7v20201028
General
-
Target
NEW ORDER ELO-05756485.exe
-
Size
528KB
-
MD5
ef847f9fc2339b9470150fef1105b5fe
-
SHA1
eb9b2c97525c2b167d1ae4bdeba308f1c4d9206d
-
SHA256
9e54241184e45b1950037313896e0d2e864cc9d373f5a2f14b0af405094fd1a4
-
SHA512
ea26bb55d9d79ca887b184b71746328e65b06b24d701d7856f6f416a1fc93f750580b68a8204b30eb94dabc9e899e4baf4358f23ef5ce7ea23308369b5be4c10
Malware Config
Extracted
formbook
4.1
http://www.dingolope.com/riai/
856380892.xyz
goproteinz.com
girigratis.com
4schwuleautoren.com
artofwrestlingicons.com
miles4moms.com
tamiigun.com
noritamoneyconsultants.net
blacklionllc.net
elevictory.com
happinessmail.com
thymocide.net
123goimmo.com
advocate4deaf.com
lovelyforum.net
rentlondonapartment.com
weinsureplanes.com
tagfqjxf.icu
thewellbeingsutra.com
enibo-official.com
gammacake.com
flyingshiitake.com
heryay.com
myonlinereturns.com
goodxweb.com
soukefu.com
stuntmemorabilia.net
ourlivesinchristmatters.com
capslock-europe.com
trannghiason.com
makeproductcool.com
siezubehor.com
architeizer.com
smartwisecapital.info
mybuildingneeds.com
jumlasx.xyz
theclevergoalie.com
polvodeoro.com
wheretofindmarina.com
learningfitbit.com
buyanijuan.com
aplusdrilling.com
dulcification-comforter.info
bjkjrd.com
dehaochu.com
jaceandjenelle.com
upperish.com
asociadosresidenciales.com
timedoesnote082703.xyz
hackinson.com
3d3366.com
harringtonstoowoomba.com
amandawilsonsolutions.com
skipbinsplus.com
plataformacampeao.com
sleepasana.com
pinupcasino-start.site
chamosgt.com
3pisbd.com
yourbesttacolife.com
synaptictalent.com
controlservicesreport.com
westrenworld.com
watertomato.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1404-16-0x000000000041ED30-mapping.dmp formbook behavioral2/memory/3288-24-0x0000000000D60000-0x0000000000D8E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
NEW ORDER ELO-05756485.exeNEW ORDER ELO-05756485.exewscript.exedescription pid process target process PID 540 set thread context of 1404 540 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 1404 set thread context of 3016 1404 NEW ORDER ELO-05756485.exe Explorer.EXE PID 3288 set thread context of 3016 3288 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
NEW ORDER ELO-05756485.exeNEW ORDER ELO-05756485.exewscript.exepid process 540 NEW ORDER ELO-05756485.exe 540 NEW ORDER ELO-05756485.exe 540 NEW ORDER ELO-05756485.exe 540 NEW ORDER ELO-05756485.exe 1404 NEW ORDER ELO-05756485.exe 1404 NEW ORDER ELO-05756485.exe 1404 NEW ORDER ELO-05756485.exe 1404 NEW ORDER ELO-05756485.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe 3288 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
NEW ORDER ELO-05756485.exewscript.exepid process 1404 NEW ORDER ELO-05756485.exe 1404 NEW ORDER ELO-05756485.exe 1404 NEW ORDER ELO-05756485.exe 3288 wscript.exe 3288 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
NEW ORDER ELO-05756485.exeNEW ORDER ELO-05756485.exewscript.exedescription pid process Token: SeDebugPrivilege 540 NEW ORDER ELO-05756485.exe Token: SeDebugPrivilege 1404 NEW ORDER ELO-05756485.exe Token: SeDebugPrivilege 3288 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
NEW ORDER ELO-05756485.exeExplorer.EXEwscript.exedescription pid process target process PID 540 wrote to memory of 1404 540 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 540 wrote to memory of 1404 540 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 540 wrote to memory of 1404 540 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 540 wrote to memory of 1404 540 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 540 wrote to memory of 1404 540 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 540 wrote to memory of 1404 540 NEW ORDER ELO-05756485.exe NEW ORDER ELO-05756485.exe PID 3016 wrote to memory of 3288 3016 Explorer.EXE wscript.exe PID 3016 wrote to memory of 3288 3016 Explorer.EXE wscript.exe PID 3016 wrote to memory of 3288 3016 Explorer.EXE wscript.exe PID 3288 wrote to memory of 1172 3288 wscript.exe cmd.exe PID 3288 wrote to memory of 1172 3288 wscript.exe cmd.exe PID 3288 wrote to memory of 1172 3288 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/540-13-0x0000000000F00000-0x0000000000F75000-memory.dmpFilesize
468KB
-
memory/540-3-0x00000000006D0000-0x00000000006D1000-memory.dmpFilesize
4KB
-
memory/540-2-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/540-6-0x0000000005670000-0x0000000005671000-memory.dmpFilesize
4KB
-
memory/540-7-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/540-8-0x0000000005370000-0x0000000005371000-memory.dmpFilesize
4KB
-
memory/540-9-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/540-10-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/540-11-0x000000007F640000-0x000000007F641000-memory.dmpFilesize
4KB
-
memory/540-14-0x0000000000F80000-0x0000000000FB3000-memory.dmpFilesize
204KB
-
memory/540-5-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/540-12-0x0000000007680000-0x0000000007684000-memory.dmpFilesize
16KB
-
memory/1172-22-0x0000000000000000-mapping.dmp
-
memory/1404-18-0x0000000000EF0000-0x0000000001210000-memory.dmpFilesize
3.1MB
-
memory/1404-19-0x0000000000980000-0x0000000000994000-memory.dmpFilesize
80KB
-
memory/1404-16-0x000000000041ED30-mapping.dmp
-
memory/1404-15-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3016-20-0x00000000062D0000-0x00000000063D2000-memory.dmpFilesize
1.0MB
-
memory/3288-21-0x0000000000000000-mapping.dmp
-
memory/3288-26-0x0000000005050000-0x00000000050E3000-memory.dmpFilesize
588KB
-
memory/3288-24-0x0000000000D60000-0x0000000000D8E000-memory.dmpFilesize
184KB
-
memory/3288-23-0x0000000001260000-0x0000000001287000-memory.dmpFilesize
156KB
-
memory/3288-25-0x00000000052E0000-0x0000000005600000-memory.dmpFilesize
3.1MB