Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-05-2021 10:53
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-10764.exe
Resource
win7v20210408
General
-
Target
Purchase Order-10764.exe
-
Size
778KB
-
MD5
e215c8ce14ee4aaef36fff8d642d65f2
-
SHA1
51ac31f69e5b45e738ed6d38539c228693ac4ce7
-
SHA256
9e393967e94c1f667955493b1b23f0b74c732a46c4eaa04d6e13a51c33a17ab9
-
SHA512
12eb4ab62431fe882651d178ef8288f9f934a30af602177eebd54f2f94f2d3cfacf03488fc7ac9975f7c65e58ee9f502c347f84b9372e05ce68c71d91c0f4090
Malware Config
Extracted
formbook
4.1
http://www.magnumopuspro.com/nyr/
anemone-vintage.com
ironcitytools.com
joshandmatthew.com
breathtakingscenery.photos
karabakh-terror.com
micahelgall.com
entretiendesterrasses.com
mhgholdings.com
blewm.com
sidewalknotary.com
ytrs-elec.com
danhpham.com
ma21cle2henz.xyz
lotusforlease.com
shipleyphotoandfilm.com
bulktool.xyz
ouedzmala.com
yichengvpr.com
connectmygames.com
chjcsc.com
dope-chocolate.com
tacowench.com
projectsbay.com
xn--pgboc92d.com
royaldropofoil.com
ranguanglian.club
mobilne-kucice.com
buytsycon.com
goiasbets.net
blpetroleum.com
starrealms.net
exclusiveflooringcollection.com
kudalive.com
tienda-sky.com
drillinginsider.info
theglasshousenyc.com
vietnammoi.xyz
walterbenicio.com
zoomtvliveshows.xyz
boujiehoodbaby.com
yzyangyu.com
exploreecetera.com
sycord.com
waykifood.com
shadingconsultancy.com
precedentai.net
linhanhkitchen.com
expekt24.com
socialdating24.com
lubvim.com
floryi.com
alerist.com
maluss.com
hitbbq.com
alerrandrotattoo.com
algoplayer.com
idahooutsiders.com
qygmuakhk.club
neverpossible.com
winparadigm.com
toughdecorative.com
yourbuildmedia.com
summercrowd.com
josemvazquez.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3360-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3360-126-0x000000000041EBA0-mapping.dmp formbook behavioral2/memory/2140-134-0x0000000000860000-0x000000000088E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Purchase Order-10764.exePurchase Order-10764.exewscript.exedescription pid process target process PID 1908 set thread context of 3360 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 3360 set thread context of 2460 3360 Purchase Order-10764.exe Explorer.EXE PID 2140 set thread context of 2460 2140 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
Purchase Order-10764.exePurchase Order-10764.exewscript.exepid process 1908 Purchase Order-10764.exe 1908 Purchase Order-10764.exe 3360 Purchase Order-10764.exe 3360 Purchase Order-10764.exe 3360 Purchase Order-10764.exe 3360 Purchase Order-10764.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe 2140 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Purchase Order-10764.exewscript.exepid process 3360 Purchase Order-10764.exe 3360 Purchase Order-10764.exe 3360 Purchase Order-10764.exe 2140 wscript.exe 2140 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Purchase Order-10764.exePurchase Order-10764.exewscript.exedescription pid process Token: SeDebugPrivilege 1908 Purchase Order-10764.exe Token: SeDebugPrivilege 3360 Purchase Order-10764.exe Token: SeDebugPrivilege 2140 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Purchase Order-10764.exeExplorer.EXEwscript.exedescription pid process target process PID 1908 wrote to memory of 3984 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3984 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3984 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3360 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3360 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3360 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3360 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3360 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 1908 wrote to memory of 3360 1908 Purchase Order-10764.exe Purchase Order-10764.exe PID 2460 wrote to memory of 2140 2460 Explorer.EXE wscript.exe PID 2460 wrote to memory of 2140 2460 Explorer.EXE wscript.exe PID 2460 wrote to memory of 2140 2460 Explorer.EXE wscript.exe PID 2140 wrote to memory of 2852 2140 wscript.exe cmd.exe PID 2140 wrote to memory of 2852 2140 wscript.exe cmd.exe PID 2140 wrote to memory of 2852 2140 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order-10764.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order-10764.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order-10764.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order-10764.exe"3⤵PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order-10764.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order-10764.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:8
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1860
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2120
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order-10764.exe"3⤵PID:2852
-
-