Analysis
-
max time kernel
150s -
max time network
108s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10-05-2021 12:34
Static task
static1
Behavioral task
behavioral1
Sample
New Orders 122020 2 x 40 HQ.pdf.exe
Resource
win7v20210410
General
-
Target
New Orders 122020 2 x 40 HQ.pdf.exe
-
Size
642KB
-
MD5
a02437aa430c0ca2847115f6ca17d0a3
-
SHA1
1fa9f7f2bae891e8e06e73bd01abf18e839829a6
-
SHA256
8df52ba27a44fa2964a2fe9de4894aefa47b3c09abaeeb9602bde6d96926136e
-
SHA512
7983864d374d31b9b5a286afbed5024f61e8636b5ca374c421ceb888699919b10ee05951713b49b56e1df4eb64eb8ea931550a9ecf6993542eef1e159eed40a3
Malware Config
Extracted
formbook
4.1
http://www.supinapp.com/grv/
morganofatlanta.com
vz473.com
hengetelt.com
bailcally.com
virtuosoonline.com
tenthousandli.com
ohanamascota.com
digi-plates.com
prismagtech.com
we-cinema.com
372680.com
smartautoexpert.xyz
mrxzg.com
apartment-brussels.com
reverseincubator.com
linkasean.com
yummicrabva.com
diguchaye.com
reaktorfatura.com
thecatsaysno.com
mpgcommunications.net
lindustrieetleca.com
seosansar.com
alohalily.com
novergi.com
universityincanada.info
atrocity.xyz
johnsonballoonblessings.com
laurelmcintosh.com
nubedepalabras.com
ycmath.com
daveysdestinations.com
yourgutterguru.com
mayas.website
bessgarments.com
xhegu.com
mybusinessdoor.com
vivaceactivewear.com
nongyan.net
tgi-mail.net
j999a.com
slteka.com
pikipikiit.com
as0594.com
insuremydriverslicense.com
kclundsblades.com
haircleanerpro.com
charlesnwahiwe.com
ervoth.com
authentiekinnovations.com
molvmg.icu
xn--k1abtc6be.xn--p1acf
arm-srl.com
hood2healer.com
austinchapter7.com
clarityentct.com
bryllaw.com
twinworksllc.com
top-trend.website
rueschlink.com
oogilab.com
thewritersbookshelf.com
jademarkproducts.com
400city.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/720-125-0x000000000041EC20-mapping.dmp formbook behavioral2/memory/720-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/720-128-0x0000000000DA0000-0x0000000000E4E000-memory.dmp formbook behavioral2/memory/2052-133-0x0000000000760000-0x000000000078E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exeNew Orders 122020 2 x 40 HQ.pdf.exenetsh.exedescription pid process target process PID 1032 set thread context of 720 1032 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 720 set thread context of 2740 720 New Orders 122020 2 x 40 HQ.pdf.exe Explorer.EXE PID 2052 set thread context of 2740 2052 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exenetsh.exepid process 720 New Orders 122020 2 x 40 HQ.pdf.exe 720 New Orders 122020 2 x 40 HQ.pdf.exe 720 New Orders 122020 2 x 40 HQ.pdf.exe 720 New Orders 122020 2 x 40 HQ.pdf.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe 2052 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exenetsh.exepid process 720 New Orders 122020 2 x 40 HQ.pdf.exe 720 New Orders 122020 2 x 40 HQ.pdf.exe 720 New Orders 122020 2 x 40 HQ.pdf.exe 2052 netsh.exe 2052 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exenetsh.exedescription pid process Token: SeDebugPrivilege 720 New Orders 122020 2 x 40 HQ.pdf.exe Token: SeDebugPrivilege 2052 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
New Orders 122020 2 x 40 HQ.pdf.exeExplorer.EXEnetsh.exedescription pid process target process PID 1032 wrote to memory of 720 1032 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1032 wrote to memory of 720 1032 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1032 wrote to memory of 720 1032 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1032 wrote to memory of 720 1032 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1032 wrote to memory of 720 1032 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 1032 wrote to memory of 720 1032 New Orders 122020 2 x 40 HQ.pdf.exe New Orders 122020 2 x 40 HQ.pdf.exe PID 2740 wrote to memory of 2052 2740 Explorer.EXE netsh.exe PID 2740 wrote to memory of 2052 2740 Explorer.EXE netsh.exe PID 2740 wrote to memory of 2052 2740 Explorer.EXE netsh.exe PID 2052 wrote to memory of 1144 2052 netsh.exe cmd.exe PID 2052 wrote to memory of 1144 2052 netsh.exe cmd.exe PID 2052 wrote to memory of 1144 2052 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New Orders 122020 2 x 40 HQ.pdf.exe"3⤵PID:1144
-
-