Overview
overview
10Static
static
8BL. NO. AN...21.exe
windows7_x64
10BL. NO. AN...21.exe
windows10_x64
10Sample_101...mg.exe
windows7_x64
10Sample_101...mg.exe
windows10_x64
10Invoice 19...df.exe
windows7_x64
1Invoice 19...df.exe
windows10_x64
10Leak/PROFO...CE.doc
windows7_x64
10Leak/PROFO...CE.doc
windows10_x64
1Payment re...df.exe
windows7_x64
10Payment re...df.exe
windows10_x64
10Leak/Profo...mg.xls
windows7_x64
10Leak/Profo...mg.xls
windows10_x64
10Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
26-10-2021 07:00
Static task
static1
Behavioral task
behavioral1
Sample
BL. NO. ANSMUNDAR3621.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
BL. NO. ANSMUNDAR3621.exe
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
Sample_10120351200_ISO_035117img.exe
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
Sample_10120351200_ISO_035117img.exe
Resource
win10-en-20211014
Behavioral task
behavioral5
Sample
Invoice 1905-20-1907-20.pdf.exe
Resource
win7-en-20210920
Behavioral task
behavioral6
Sample
Invoice 1905-20-1907-20.pdf.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
Leak/PROFORMA INVOICE.doc
Resource
win7-en-20210920
Behavioral task
behavioral8
Sample
Leak/PROFORMA INVOICE.doc
Resource
win10-en-20211014
Behavioral task
behavioral9
Sample
Payment receipt.pdf.exe
Resource
win7-en-20210920
Behavioral task
behavioral10
Sample
Payment receipt.pdf.exe
Resource
win10-en-20210920
Behavioral task
behavioral11
Sample
Leak/Proforma invoice35117img.xls
Resource
win7-en-20211014
Behavioral task
behavioral12
Sample
Leak/Proforma invoice35117img.xls
Resource
win10-en-20210920
General
-
Target
Payment receipt.pdf.exe
-
Size
707KB
-
MD5
d4be4730ee0e801938ae40b02b5ec346
-
SHA1
5a36a50fe19f08f5c34db24127b43bdceb85bb42
-
SHA256
0e6c644f1252507e018b0fbe6b83902adcd2278a083fe1902092f627babf3711
-
SHA512
d4e4a31f6be9df302010ef550191ab5c4f37aaa277e61b88600253ebd8cb7f3a670b13dfd459dc75f88946f78bc2403ca6739d042a6909411bd20dcfda149a29
Malware Config
Extracted
formbook
4.1
mo9n
http://www.lievival.info/mo9n/
circuit-town.com
stock-high.xyz
barlindelivery.com
littletoucans.com
bright-tailor.com
firsthandcares.com
ecompropeller.com
circuitoalberghiero.net
creative-egyptps.com
bitracks56.com
douhonghong.com
fingertipcollection.com
happy-bihada.space
blockchainairdropreward.com
xn--reljame-jwa.com
polloycarnesdelivery.com
d22.group
eslamshahrservice.com
vanzing.com
juzide.com
g5795ky.com
ufound1.com
cifbit.com
shawtopia.com
tourmethere.com
heritagepedia.com
832391.com
voltera.solar
greatergods.com
shchengtang.com
oyakudachibiz.com
kentislandeats.com
quietaou.com
infinitephoenix.club
tmrtg.com
menes.digital
sefappliancerepair.com
tnghana.com
tanyan.xyz
findyourtrailhead.com
labizandbryan.com
agnesdesigner.net
lebai100.com
lz-fcaini1718-hw0917-bs.xyz
nucleustudio.com
smartsparklegal.com
streets4suites.com
neo-graphite.com
maquinariaarenastlaxmexcom.com
svartmancoaching.com
icarus-groupe.com
media777.club
juicyyjuicebox.com
sakinawlake.properties
escrubpro.com
onlinecasino-tengoku.com
ganymede.sbs
sunshineprofitness.com
solideo.place
septemberstockevent100.com
tjginde.com
shopamwplanner.com
ee7r.com
sootherelaxandheal.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral9/memory/1644-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral9/memory/1644-63-0x000000000041F110-mapping.dmp formbook behavioral9/memory/1644-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral9/memory/396-74-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1788 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Payment receipt.pdf.exePayment receipt.pdf.exewininit.exedescription pid process target process PID 948 set thread context of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 1644 set thread context of 1356 1644 Payment receipt.pdf.exe Explorer.EXE PID 1644 set thread context of 1356 1644 Payment receipt.pdf.exe Explorer.EXE PID 396 set thread context of 1356 396 wininit.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Payment receipt.pdf.exePayment receipt.pdf.exewininit.exepid process 948 Payment receipt.pdf.exe 1644 Payment receipt.pdf.exe 1644 Payment receipt.pdf.exe 1644 Payment receipt.pdf.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe 396 wininit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1356 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Payment receipt.pdf.exewininit.exepid process 1644 Payment receipt.pdf.exe 1644 Payment receipt.pdf.exe 1644 Payment receipt.pdf.exe 1644 Payment receipt.pdf.exe 396 wininit.exe 396 wininit.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Payment receipt.pdf.exePayment receipt.pdf.exewininit.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 948 Payment receipt.pdf.exe Token: SeDebugPrivilege 1644 Payment receipt.pdf.exe Token: SeDebugPrivilege 396 wininit.exe Token: SeShutdownPrivilege 1356 Explorer.EXE Token: SeShutdownPrivilege 1356 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1356 Explorer.EXE 1356 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1356 Explorer.EXE 1356 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Payment receipt.pdf.exeExplorer.EXEwininit.exedescription pid process target process PID 948 wrote to memory of 668 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 668 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 668 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 668 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 948 wrote to memory of 1644 948 Payment receipt.pdf.exe Payment receipt.pdf.exe PID 1356 wrote to memory of 396 1356 Explorer.EXE wininit.exe PID 1356 wrote to memory of 396 1356 Explorer.EXE wininit.exe PID 1356 wrote to memory of 396 1356 Explorer.EXE wininit.exe PID 1356 wrote to memory of 396 1356 Explorer.EXE wininit.exe PID 396 wrote to memory of 1788 396 wininit.exe cmd.exe PID 396 wrote to memory of 1788 396 wininit.exe cmd.exe PID 396 wrote to memory of 1788 396 wininit.exe cmd.exe PID 396 wrote to memory of 1788 396 wininit.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"{path}"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment receipt.pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/396-74-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/396-71-0x0000000000000000-mapping.dmp
-
memory/396-76-0x00000000009E0000-0x0000000000A73000-memory.dmpFilesize
588KB
-
memory/396-75-0x0000000000AD0000-0x0000000000DD3000-memory.dmpFilesize
3.0MB
-
memory/396-73-0x0000000000F70000-0x0000000000F8A000-memory.dmpFilesize
104KB
-
memory/948-56-0x00000000071B0000-0x00000000071B1000-memory.dmpFilesize
4KB
-
memory/948-57-0x00000000003D0000-0x00000000003DE000-memory.dmpFilesize
56KB
-
memory/948-58-0x0000000000340000-0x00000000003C3000-memory.dmpFilesize
524KB
-
memory/948-59-0x0000000000840000-0x0000000000870000-memory.dmpFilesize
192KB
-
memory/948-54-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/1356-77-0x0000000007DC0000-0x0000000007EC5000-memory.dmpFilesize
1.0MB
-
memory/1356-66-0x0000000007120000-0x000000000726F000-memory.dmpFilesize
1.3MB
-
memory/1356-70-0x0000000007270000-0x00000000073E4000-memory.dmpFilesize
1.5MB
-
memory/1644-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1644-69-0x0000000000250000-0x0000000000264000-memory.dmpFilesize
80KB
-
memory/1644-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1644-67-0x00000000001D0000-0x00000000001E4000-memory.dmpFilesize
80KB
-
memory/1644-65-0x00000000008B0000-0x0000000000BB3000-memory.dmpFilesize
3.0MB
-
memory/1644-63-0x000000000041F110-mapping.dmp
-
memory/1644-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1644-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1788-72-0x0000000000000000-mapping.dmp