Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-05-2021 06:43
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order #330716o.exe
Resource
win7v20210408
General
-
Target
Purchase Order #330716o.exe
-
Size
704KB
-
MD5
96b356e875a0578b468ae325279bbbdf
-
SHA1
6f3ab69ca49850f49a8b67a76c7788e9988868f1
-
SHA256
cb44a6f7264ae4707ae8b0db82d0f62766f996f7bd37586401e11e5bccb30bd7
-
SHA512
de07bdc4e658c76da605f9fa45e22844b01f81bc9ec893d2e8cef44fe419b986527c49f6b7fb27a5dad7f2118d07ae3dbfc74c8791dc0b4745041852450086dd
Malware Config
Extracted
formbook
4.1
http://www.itoatoapparel.com/hfg/
0nqcaw.com
seamtube.com
chinachongren.com
shop-deinen-deal.com
socialmediabutler.net
careerenabler.net
trumpmasksshop.com
theopulencegroups.com
meshfacilities.com
sedaifu.com
ahesitanttraveler.com
xn--nbkvf9b5bzfx438ch6sa.com
iqrafootwearbd.com
akurasushinewyorkny.com
paginasny.com
www7shire.com
frenchyoutlet.com
lw14.com
nmdetransports.net
advjuniorconsultoria.com
microsoftdynamicsgroup.com
tuila.online
snapfinance-vip.com
melodiestreety.com
sepulcrovacio.com
corsgrupo.com
lavenso.net
bedbudandbeyond.net
grantsawinganddrilling.com
szhuayingt.com
lacuevazaragoza.com
msmommycaribbeanmarket.com
azaleafitch.net
hdfreeunlinited.com
cardiologianordelta.com
3in1toothfairy.com
xfsdgy.com
true92essentials.com
devis-danseuse-bresilienne.com
helpinghandsrecoveryaz.com
yngygcgs.com
arkavion.com
superteamexpansion.com
pintax.info
rainbowswim.net
webtinchap.com
projecteutopia.com
leuwvwgwvw.net
smithmountainrentals.com
economicimpactanalysis.com
lifeclub.pro
pitchforprofits.com
chaytel.com
akhlaghnews.com
xn--1-vr6ek4e.com
revicadsolutions.com
nuitek.com
bootersatlanta.com
yapasphoto.online
quant-china.xyz
xn--7dv6eu89e.com
diecasttalk.com
bracebaby.com
sonderbach.net
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3080-125-0x000000000041EBA0-mapping.dmp formbook behavioral2/memory/3080-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3848-135-0x00000000001B0000-0x00000000001DE000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Purchase Order #330716o.exePurchase Order #330716o.execolorcpl.exedescription pid process target process PID 1808 set thread context of 3080 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 3080 set thread context of 3016 3080 Purchase Order #330716o.exe Explorer.EXE PID 3080 set thread context of 3016 3080 Purchase Order #330716o.exe Explorer.EXE PID 3848 set thread context of 3016 3848 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Purchase Order #330716o.exePurchase Order #330716o.execolorcpl.exepid process 1808 Purchase Order #330716o.exe 1808 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe 3848 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Purchase Order #330716o.execolorcpl.exepid process 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3080 Purchase Order #330716o.exe 3848 colorcpl.exe 3848 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Purchase Order #330716o.exePurchase Order #330716o.execolorcpl.exedescription pid process Token: SeDebugPrivilege 1808 Purchase Order #330716o.exe Token: SeDebugPrivilege 3080 Purchase Order #330716o.exe Token: SeDebugPrivilege 3848 colorcpl.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Purchase Order #330716o.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 1808 wrote to memory of 3724 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3724 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3724 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3080 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3080 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3080 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3080 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3080 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1808 wrote to memory of 3080 1808 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 3016 wrote to memory of 3848 3016 Explorer.EXE colorcpl.exe PID 3016 wrote to memory of 3848 3016 Explorer.EXE colorcpl.exe PID 3016 wrote to memory of 3848 3016 Explorer.EXE colorcpl.exe PID 3848 wrote to memory of 2320 3848 colorcpl.exe cmd.exe PID 3848 wrote to memory of 2320 3848 colorcpl.exe cmd.exe PID 3848 wrote to memory of 2320 3848 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"3⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1292
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3744
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3960
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2192
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3968
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1632
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2120
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3852
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"3⤵PID:2320
-
-