Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
08-05-2021 07:03
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order #330716o.exe
Resource
win7v20210408
General
-
Target
Purchase Order #330716o.exe
-
Size
704KB
-
MD5
96b356e875a0578b468ae325279bbbdf
-
SHA1
6f3ab69ca49850f49a8b67a76c7788e9988868f1
-
SHA256
cb44a6f7264ae4707ae8b0db82d0f62766f996f7bd37586401e11e5bccb30bd7
-
SHA512
de07bdc4e658c76da605f9fa45e22844b01f81bc9ec893d2e8cef44fe419b986527c49f6b7fb27a5dad7f2118d07ae3dbfc74c8791dc0b4745041852450086dd
Malware Config
Extracted
formbook
4.1
http://www.itoatoapparel.com/hfg/
0nqcaw.com
seamtube.com
chinachongren.com
shop-deinen-deal.com
socialmediabutler.net
careerenabler.net
trumpmasksshop.com
theopulencegroups.com
meshfacilities.com
sedaifu.com
ahesitanttraveler.com
xn--nbkvf9b5bzfx438ch6sa.com
iqrafootwearbd.com
akurasushinewyorkny.com
paginasny.com
www7shire.com
frenchyoutlet.com
lw14.com
nmdetransports.net
advjuniorconsultoria.com
microsoftdynamicsgroup.com
tuila.online
snapfinance-vip.com
melodiestreety.com
sepulcrovacio.com
corsgrupo.com
lavenso.net
bedbudandbeyond.net
grantsawinganddrilling.com
szhuayingt.com
lacuevazaragoza.com
msmommycaribbeanmarket.com
azaleafitch.net
hdfreeunlinited.com
cardiologianordelta.com
3in1toothfairy.com
xfsdgy.com
true92essentials.com
devis-danseuse-bresilienne.com
helpinghandsrecoveryaz.com
yngygcgs.com
arkavion.com
superteamexpansion.com
pintax.info
rainbowswim.net
webtinchap.com
projecteutopia.com
leuwvwgwvw.net
smithmountainrentals.com
economicimpactanalysis.com
lifeclub.pro
pitchforprofits.com
chaytel.com
akhlaghnews.com
xn--1-vr6ek4e.com
revicadsolutions.com
nuitek.com
bootersatlanta.com
yapasphoto.online
quant-china.xyz
xn--7dv6eu89e.com
diecasttalk.com
bracebaby.com
sonderbach.net
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1232-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1232-67-0x000000000041EBA0-mapping.dmp formbook behavioral1/memory/608-76-0x0000000000100000-0x000000000012E000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1644 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Purchase Order #330716o.exePurchase Order #330716o.exeexplorer.exedescription pid process target process PID 1608 set thread context of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1232 set thread context of 1212 1232 Purchase Order #330716o.exe Explorer.EXE PID 608 set thread context of 1212 608 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Purchase Order #330716o.exeexplorer.exepid process 1232 Purchase Order #330716o.exe 1232 Purchase Order #330716o.exe 608 explorer.exe 608 explorer.exe 608 explorer.exe 608 explorer.exe 608 explorer.exe 608 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Purchase Order #330716o.exeexplorer.exepid process 1232 Purchase Order #330716o.exe 1232 Purchase Order #330716o.exe 1232 Purchase Order #330716o.exe 608 explorer.exe 608 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase Order #330716o.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1232 Purchase Order #330716o.exe Token: SeDebugPrivilege 608 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Purchase Order #330716o.exeExplorer.EXEexplorer.exedescription pid process target process PID 1608 wrote to memory of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1608 wrote to memory of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1608 wrote to memory of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1608 wrote to memory of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1608 wrote to memory of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1608 wrote to memory of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1608 wrote to memory of 1232 1608 Purchase Order #330716o.exe Purchase Order #330716o.exe PID 1212 wrote to memory of 608 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 608 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 608 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 608 1212 Explorer.EXE explorer.exe PID 608 wrote to memory of 1644 608 explorer.exe cmd.exe PID 608 wrote to memory of 1644 608 explorer.exe cmd.exe PID 608 wrote to memory of 1644 608 explorer.exe cmd.exe PID 608 wrote to memory of 1644 608 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order #330716o.exe"3⤵
- Deletes itself
PID:1644
-
-