Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 05:39
Static task
static1
Behavioral task
behavioral1
Sample
Payment receipt.pdf.exe
Resource
win7-en-20210920
General
-
Target
Payment receipt.pdf.exe
-
Size
707KB
-
MD5
d4be4730ee0e801938ae40b02b5ec346
-
SHA1
5a36a50fe19f08f5c34db24127b43bdceb85bb42
-
SHA256
0e6c644f1252507e018b0fbe6b83902adcd2278a083fe1902092f627babf3711
-
SHA512
d4e4a31f6be9df302010ef550191ab5c4f37aaa277e61b88600253ebd8cb7f3a670b13dfd459dc75f88946f78bc2403ca6739d042a6909411bd20dcfda149a29
Malware Config
Extracted
formbook
4.1
mo9n
http://www.lievival.info/mo9n/
circuit-town.com
stock-high.xyz
barlindelivery.com
littletoucans.com
bright-tailor.com
firsthandcares.com
ecompropeller.com
circuitoalberghiero.net
creative-egyptps.com
bitracks56.com
douhonghong.com
fingertipcollection.com
happy-bihada.space
blockchainairdropreward.com
xn--reljame-jwa.com
polloycarnesdelivery.com
d22.group
eslamshahrservice.com
vanzing.com
juzide.com
g5795ky.com
ufound1.com
cifbit.com
shawtopia.com
tourmethere.com
heritagepedia.com
832391.com
voltera.solar
greatergods.com
shchengtang.com
oyakudachibiz.com
kentislandeats.com
quietaou.com
infinitephoenix.club
tmrtg.com
menes.digital
sefappliancerepair.com
tnghana.com
tanyan.xyz
findyourtrailhead.com
labizandbryan.com
agnesdesigner.net
lebai100.com
lz-fcaini1718-hw0917-bs.xyz
nucleustudio.com
smartsparklegal.com
streets4suites.com
neo-graphite.com
maquinariaarenastlaxmexcom.com
svartmancoaching.com
icarus-groupe.com
media777.club
juicyyjuicebox.com
sakinawlake.properties
escrubpro.com
onlinecasino-tengoku.com
ganymede.sbs
sunshineprofitness.com
solideo.place
septemberstockevent100.com
tjginde.com
shopamwplanner.com
ee7r.com
sootherelaxandheal.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4032-126-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4032-127-0x000000000041F110-mapping.dmp formbook behavioral2/memory/1812-134-0x00000000007C0000-0x00000000007EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Payment receipt.pdf.exePayment receipt.pdf.execontrol.exedescription pid process target process PID 3912 set thread context of 4032 3912 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 4032 set thread context of 3008 4032 Payment receipt.pdf.exe Explorer.EXE PID 1812 set thread context of 3008 1812 control.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
Payment receipt.pdf.execontrol.exepid process 4032 Payment receipt.pdf.exe 4032 Payment receipt.pdf.exe 4032 Payment receipt.pdf.exe 4032 Payment receipt.pdf.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe 1812 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3008 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Payment receipt.pdf.execontrol.exepid process 4032 Payment receipt.pdf.exe 4032 Payment receipt.pdf.exe 4032 Payment receipt.pdf.exe 1812 control.exe 1812 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment receipt.pdf.execontrol.exedescription pid process Token: SeDebugPrivilege 4032 Payment receipt.pdf.exe Token: SeDebugPrivilege 1812 control.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Payment receipt.pdf.exeExplorer.EXEcontrol.exedescription pid process target process PID 3912 wrote to memory of 4032 3912 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 3912 wrote to memory of 4032 3912 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 3912 wrote to memory of 4032 3912 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 3912 wrote to memory of 4032 3912 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 3912 wrote to memory of 4032 3912 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 3912 wrote to memory of 4032 3912 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 3008 wrote to memory of 1812 3008 Explorer.EXE control.exe PID 3008 wrote to memory of 1812 3008 Explorer.EXE control.exe PID 3008 wrote to memory of 1812 3008 Explorer.EXE control.exe PID 1812 wrote to memory of 2616 1812 control.exe cmd.exe PID 1812 wrote to memory of 2616 1812 control.exe cmd.exe PID 1812 wrote to memory of 2616 1812 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1812-137-0x00000000047C0000-0x0000000004853000-memory.dmpFilesize
588KB
-
memory/1812-136-0x0000000004950000-0x0000000004C70000-memory.dmpFilesize
3.1MB
-
memory/1812-133-0x0000000000D20000-0x0000000000D40000-memory.dmpFilesize
128KB
-
memory/1812-134-0x00000000007C0000-0x00000000007EF000-memory.dmpFilesize
188KB
-
memory/1812-132-0x0000000000000000-mapping.dmp
-
memory/2616-135-0x0000000000000000-mapping.dmp
-
memory/3008-130-0x0000000006300000-0x000000000642E000-memory.dmpFilesize
1.2MB
-
memory/3008-138-0x00000000027E0000-0x00000000028A0000-memory.dmpFilesize
768KB
-
memory/3912-121-0x0000000007C20000-0x0000000007C21000-memory.dmpFilesize
4KB
-
memory/3912-120-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3912-117-0x0000000007980000-0x0000000007981000-memory.dmpFilesize
4KB
-
memory/3912-118-0x0000000007F20000-0x0000000007F21000-memory.dmpFilesize
4KB
-
memory/3912-119-0x0000000007AC0000-0x0000000007AC1000-memory.dmpFilesize
4KB
-
memory/3912-124-0x0000000004F00000-0x0000000004F83000-memory.dmpFilesize
524KB
-
memory/3912-125-0x0000000007EE0000-0x0000000007F10000-memory.dmpFilesize
192KB
-
memory/3912-123-0x0000000007AB0000-0x0000000007ABE000-memory.dmpFilesize
56KB
-
memory/3912-122-0x0000000007A20000-0x0000000007F1E000-memory.dmpFilesize
5.0MB
-
memory/3912-115-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/4032-131-0x00000000017D0000-0x00000000017E4000-memory.dmpFilesize
80KB
-
memory/4032-129-0x0000000001800000-0x0000000001B20000-memory.dmpFilesize
3.1MB
-
memory/4032-127-0x000000000041F110-mapping.dmp
-
memory/4032-126-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB