Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-04-2021 07:04
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER - BLL04658464.exe
Resource
win7v20201028
General
-
Target
NEW ORDER - BLL04658464.exe
-
Size
641KB
-
MD5
c43b615ee95f80f037b142b55decf144
-
SHA1
1cb557a6198866592dd0644d0561edafae222f06
-
SHA256
fea4f85475d53bbb39592cb92dc6588948b1dd218e4ac554749ffe1fc26ffc67
-
SHA512
189590db3368a348bf827f9e46970a64b29d95587dbbab7fbc0a000e51e3f5845bfbf8b8bf3a9a8c57273fce15d68ad9c7704daff2b37daae1b9b69aa7dac674
Malware Config
Extracted
formbook
4.1
http://www.bendhighswimming.com/crdi/
propertyjumpstartwebinar.com
boc-vip.club
polestarnyc.com
travelonlinebiz.com
bukovynaent.com
bestfashoin.com
miniindiastore.com
wehatebillgates.com
holmescountyjusticecourt.com
colectivorenovemosjuntos.com
houstowarehouse.com
aocsw.com
sml-uniform.com
bandanasaint.com
petposhdeluxe.com
ezcscpawq.com
ladiesoption.club
refixu.com
selfwrrrth.com
rovietry.com
enaoc.com
karyolaw.com
diversitymarketingtx.net
browsersentenderbanco.net
samtheshepherd.com
nash-arbitrazh.com
gampang-kerja.tech
ereplacementparrts.com
eventmidasbuy14.com
sia-rikvel.com
top2016.net
686638.com
ton.blue
desktower.net
dbykq020.com
stack30.com
tiendasfotoprix.com
kylesmaier.com
ekmantsang.com
jumlasx.xyz
qingqingyuyin.com
cdnsubs.xyz
maxamoose.com
huelling.com
xn--bjrnnstet-z2a8q.online
betale-posten.com
lalatendu.info
nochipmanicure.net
bichat.website
washington32reds.com
centrodesaludcrecer.com
phihoteldeimedaglioni.com
kilmalliefarms.com
icecreamsocialwp.com
mac-makeup.club
elzooz.com
iqomw.com
bestattorneycle.com
startonsocial.com
purensoessentials.com
therealyolandafay.com
feildwolf.com
nativesupps.com
nbatimeout.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3824-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3824-16-0x000000000041ED20-mapping.dmp formbook behavioral2/memory/4168-24-0x0000000000150000-0x000000000017E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
NEW ORDER - BLL04658464.exeNEW ORDER - BLL04658464.exeipconfig.exedescription pid process target process PID 4636 set thread context of 3824 4636 NEW ORDER - BLL04658464.exe NEW ORDER - BLL04658464.exe PID 3824 set thread context of 2956 3824 NEW ORDER - BLL04658464.exe Explorer.EXE PID 4168 set thread context of 2956 4168 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 4168 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
NEW ORDER - BLL04658464.exeNEW ORDER - BLL04658464.exeipconfig.exepid process 4636 NEW ORDER - BLL04658464.exe 4636 NEW ORDER - BLL04658464.exe 4636 NEW ORDER - BLL04658464.exe 4636 NEW ORDER - BLL04658464.exe 3824 NEW ORDER - BLL04658464.exe 3824 NEW ORDER - BLL04658464.exe 3824 NEW ORDER - BLL04658464.exe 3824 NEW ORDER - BLL04658464.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe 4168 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
NEW ORDER - BLL04658464.exeipconfig.exepid process 3824 NEW ORDER - BLL04658464.exe 3824 NEW ORDER - BLL04658464.exe 3824 NEW ORDER - BLL04658464.exe 4168 ipconfig.exe 4168 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
NEW ORDER - BLL04658464.exeNEW ORDER - BLL04658464.exeipconfig.exedescription pid process Token: SeDebugPrivilege 4636 NEW ORDER - BLL04658464.exe Token: SeDebugPrivilege 3824 NEW ORDER - BLL04658464.exe Token: SeDebugPrivilege 4168 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
NEW ORDER - BLL04658464.exeExplorer.EXEipconfig.exedescription pid process target process PID 4636 wrote to memory of 3824 4636 NEW ORDER - BLL04658464.exe NEW ORDER - BLL04658464.exe PID 4636 wrote to memory of 3824 4636 NEW ORDER - BLL04658464.exe NEW ORDER - BLL04658464.exe PID 4636 wrote to memory of 3824 4636 NEW ORDER - BLL04658464.exe NEW ORDER - BLL04658464.exe PID 4636 wrote to memory of 3824 4636 NEW ORDER - BLL04658464.exe NEW ORDER - BLL04658464.exe PID 4636 wrote to memory of 3824 4636 NEW ORDER - BLL04658464.exe NEW ORDER - BLL04658464.exe PID 4636 wrote to memory of 3824 4636 NEW ORDER - BLL04658464.exe NEW ORDER - BLL04658464.exe PID 2956 wrote to memory of 4168 2956 Explorer.EXE ipconfig.exe PID 2956 wrote to memory of 4168 2956 Explorer.EXE ipconfig.exe PID 2956 wrote to memory of 4168 2956 Explorer.EXE ipconfig.exe PID 4168 wrote to memory of 4068 4168 ipconfig.exe cmd.exe PID 4168 wrote to memory of 4068 4168 ipconfig.exe cmd.exe PID 4168 wrote to memory of 4068 4168 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER - BLL04658464.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER - BLL04658464.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER - BLL04658464.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER - BLL04658464.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER - BLL04658464.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2956-28-0x00000000024E0000-0x000000000258E000-memory.dmpFilesize
696KB
-
memory/2956-21-0x0000000000680000-0x000000000074E000-memory.dmpFilesize
824KB
-
memory/3824-15-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3824-20-0x0000000001360000-0x0000000001374000-memory.dmpFilesize
80KB
-
memory/3824-19-0x0000000001400000-0x0000000001720000-memory.dmpFilesize
3.1MB
-
memory/3824-16-0x000000000041ED20-mapping.dmp
-
memory/4068-26-0x0000000000000000-mapping.dmp
-
memory/4168-23-0x0000000001010000-0x000000000101B000-memory.dmpFilesize
44KB
-
memory/4168-22-0x0000000000000000-mapping.dmp
-
memory/4168-27-0x00000000009B0000-0x0000000000A43000-memory.dmpFilesize
588KB
-
memory/4168-25-0x0000000000AA0000-0x0000000000DC0000-memory.dmpFilesize
3.1MB
-
memory/4168-24-0x0000000000150000-0x000000000017E000-memory.dmpFilesize
184KB
-
memory/4636-10-0x00000000054F0000-0x00000000054F1000-memory.dmpFilesize
4KB
-
memory/4636-9-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/4636-8-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/4636-7-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/4636-6-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/4636-11-0x00000000089A0000-0x00000000089A4000-memory.dmpFilesize
16KB
-
memory/4636-2-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4636-14-0x0000000007040000-0x0000000007073000-memory.dmpFilesize
204KB
-
memory/4636-13-0x0000000001010000-0x0000000001088000-memory.dmpFilesize
480KB
-
memory/4636-5-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/4636-12-0x000000007FD00000-0x000000007FD01000-memory.dmpFilesize
4KB
-
memory/4636-3-0x0000000000890000-0x0000000000891000-memory.dmpFilesize
4KB