Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
10-05-2021 12:34
Static task
static1
Behavioral task
behavioral1
Sample
New Orders 122020 2 x 40 HQ.pdf.exe
Resource
win7v20210410
General
-
Target
New Orders 122020 2 x 40 HQ.pdf.exe
-
Size
642KB
-
MD5
a02437aa430c0ca2847115f6ca17d0a3
-
SHA1
1fa9f7f2bae891e8e06e73bd01abf18e839829a6
-
SHA256
8df52ba27a44fa2964a2fe9de4894aefa47b3c09abaeeb9602bde6d96926136e
-
SHA512
7983864d374d31b9b5a286afbed5024f61e8636b5ca374c421ceb888699919b10ee05951713b49b56e1df4eb64eb8ea931550a9ecf6993542eef1e159eed40a3
Malware Config
Extracted
formbook
4.1
http://www.supinapp.com/grv/
morganofatlanta.com
vz473.com
hengetelt.com
bailcally.com
virtuosoonline.com
tenthousandli.com
ohanamascota.com
digi-plates.com
prismagtech.com
we-cinema.com
372680.com
smartautoexpert.xyz
mrxzg.com
apartment-brussels.com
reverseincubator.com
linkasean.com
yummicrabva.com
diguchaye.com
reaktorfatura.com
thecatsaysno.com
mpgcommunications.net
lindustrieetleca.com
seosansar.com
alohalily.com
novergi.com
universityincanada.info
atrocity.xyz
johnsonballoonblessings.com
laurelmcintosh.com
nubedepalabras.com
ycmath.com
daveysdestinations.com
yourgutterguru.com
mayas.website
bessgarments.com
xhegu.com
mybusinessdoor.com
vivaceactivewear.com
nongyan.net
tgi-mail.net
j999a.com
slteka.com
pikipikiit.com
as0594.com
insuremydriverslicense.com
kclundsblades.com
haircleanerpro.com
charlesnwahiwe.com
ervoth.com
authentiekinnovations.com
molvmg.icu
xn--k1abtc6be.xn--p1acf
arm-srl.com
hood2healer.com
austinchapter7.com
clarityentct.com
bryllaw.com
twinworksllc.com
top-trend.website
rueschlink.com
oogilab.com
thewritersbookshelf.com
jademarkproducts.com
400city.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/292-66-0x000000000041EC20-mapping.dmp formbook behavioral1/memory/292-65-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1140-76-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1900 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exeNew Orders 122020 2 x 40 HQ.pdf.exenetsh.exedescription pid process target process PID 1268 set thread context of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 292 set thread context of 1196 292 New Orders 122020 2 x 40 HQ.pdf.exe Explorer.EXE PID 292 set thread context of 1196 292 New Orders 122020 2 x 40 HQ.pdf.exe Explorer.EXE PID 1140 set thread context of 1196 1140 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exenetsh.exepid process 292 New Orders 122020 2 x 40 HQ.pdf.exe 292 New Orders 122020 2 x 40 HQ.pdf.exe 292 New Orders 122020 2 x 40 HQ.pdf.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exenetsh.exepid process 292 New Orders 122020 2 x 40 HQ.pdf.exe 292 New Orders 122020 2 x 40 HQ.pdf.exe 292 New Orders 122020 2 x 40 HQ.pdf.exe 292 New Orders 122020 2 x 40 HQ.pdf.exe 1140 netsh.exe 1140 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exenetsh.exedescription pid process Token: SeDebugPrivilege 292 New Orders 122020 2 x 40 HQ.pdf.exe Token: SeDebugPrivilege 1140 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exeExplorer.EXEnetsh.exedescription pid process target process PID 1268 wrote to memory of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1268 wrote to memory of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1268 wrote to memory of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1268 wrote to memory of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1268 wrote to memory of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1268 wrote to memory of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1268 wrote to memory of 292 1268 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1196 wrote to memory of 1140 1196 Explorer.EXE netsh.exe PID 1196 wrote to memory of 1140 1196 Explorer.EXE netsh.exe PID 1196 wrote to memory of 1140 1196 Explorer.EXE netsh.exe PID 1196 wrote to memory of 1140 1196 Explorer.EXE netsh.exe PID 1140 wrote to memory of 1900 1140 netsh.exe cmd.exe PID 1140 wrote to memory of 1900 1140 netsh.exe cmd.exe PID 1140 wrote to memory of 1900 1140 netsh.exe cmd.exe PID 1140 wrote to memory of 1900 1140 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"3⤵
- Deletes itself
PID:1900
-
-