Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
08-05-2021 06:43
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order #330716o.exe
Resource
win7v20210408
General
-
Target
Purchase Order #330716o.exe
-
Size
704KB
-
MD5
96b356e875a0578b468ae325279bbbdf
-
SHA1
6f3ab69ca49850f49a8b67a76c7788e9988868f1
-
SHA256
cb44a6f7264ae4707ae8b0db82d0f62766f996f7bd37586401e11e5bccb30bd7
-
SHA512
de07bdc4e658c76da605f9fa45e22844b01f81bc9ec893d2e8cef44fe419b986527c49f6b7fb27a5dad7f2118d07ae3dbfc74c8791dc0b4745041852450086dd
Malware Config
Extracted
formbook
4.1
http://www.itoatoapparel.com/hfg/
0nqcaw.com
seamtube.com
chinachongren.com
shop-deinen-deal.com
socialmediabutler.net
careerenabler.net
trumpmasksshop.com
theopulencegroups.com
meshfacilities.com
sedaifu.com
ahesitanttraveler.com
xn--nbkvf9b5bzfx438ch6sa.com
iqrafootwearbd.com
akurasushinewyorkny.com
paginasny.com
www7shire.com
frenchyoutlet.com
lw14.com
nmdetransports.net
advjuniorconsultoria.com
microsoftdynamicsgroup.com
tuila.online
snapfinance-vip.com
melodiestreety.com
sepulcrovacio.com
corsgrupo.com
lavenso.net
bedbudandbeyond.net
grantsawinganddrilling.com
szhuayingt.com
lacuevazaragoza.com
msmommycaribbeanmarket.com
azaleafitch.net
hdfreeunlinited.com
cardiologianordelta.com
3in1toothfairy.com
xfsdgy.com
true92essentials.com
devis-danseuse-bresilienne.com
helpinghandsrecoveryaz.com
yngygcgs.com
arkavion.com
superteamexpansion.com
pintax.info
rainbowswim.net
webtinchap.com
projecteutopia.com
leuwvwgwvw.net
smithmountainrentals.com
economicimpactanalysis.com
lifeclub.pro
pitchforprofits.com
chaytel.com
akhlaghnews.com
xn--1-vr6ek4e.com
revicadsolutions.com
nuitek.com
bootersatlanta.com
yapasphoto.online
quant-china.xyz
xn--7dv6eu89e.com
diecasttalk.com
bracebaby.com
sonderbach.net
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/844-67-0x000000000041EBA0-mapping.dmp formbook behavioral1/memory/844-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/636-76-0x00000000000C0000-0x00000000000EE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1756 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Purchase Order #330716o.exePurchase Order #330716o.exeraserver.exedescription pid process target process PID 756 set thread context of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 844 set thread context of 1208 844 Purchase Order #330716o.exe Explorer.EXE PID 636 set thread context of 1208 636 raserver.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Purchase Order #330716o.exeraserver.exepid process 844 Purchase Order #330716o.exe 844 Purchase Order #330716o.exe 636 raserver.exe 636 raserver.exe 636 raserver.exe 636 raserver.exe 636 raserver.exe 636 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Purchase Order #330716o.exeraserver.exepid process 844 Purchase Order #330716o.exe 844 Purchase Order #330716o.exe 844 Purchase Order #330716o.exe 636 raserver.exe 636 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase Order #330716o.exeraserver.exedescription pid process Token: SeDebugPrivilege 844 Purchase Order #330716o.exe Token: SeDebugPrivilege 636 raserver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Purchase Order #330716o.exeExplorer.EXEraserver.exedescription pid process target process PID 756 wrote to memory of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 756 wrote to memory of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 756 wrote to memory of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 756 wrote to memory of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 756 wrote to memory of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 756 wrote to memory of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 756 wrote to memory of 844 756 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1208 wrote to memory of 636 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 636 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 636 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 636 1208 Explorer.EXE raserver.exe PID 636 wrote to memory of 1756 636 raserver.exe cmd.exe PID 636 wrote to memory of 1756 636 raserver.exe cmd.exe PID 636 wrote to memory of 1756 636 raserver.exe cmd.exe PID 636 wrote to memory of 1756 636 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"3⤵
- Deletes itself
PID:1756
-
-