Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
06-04-2022 17:29
Static task
static1
Behavioral task
behavioral1
Sample
new order pdf.exe
Resource
win7-20220311-en
General
-
Target
new order pdf.exe
-
Size
499KB
-
MD5
628a7485ff121976a776a305616581f5
-
SHA1
b14a8eb559a7a28388b7cede334ccc08914c2516
-
SHA256
a8e45b2b0117e0a1e195a054667fca524862223bd2838a17f2ac9f47fe6191cc
-
SHA512
4dadf6ca85e4d41fcbb1816fa854a5eba0e37aca2539ea0bacf9920729bf9a602c65ec0745a0d89347d032a0bdef5f9c95196126f1b2c244833ba10e4296ec79
Malware Config
Extracted
formbook
4.1
g2m3
stocktonfingerprinting.com
metaaiqr.com
junicy.com
libertymutualgrou.com
jklhs7gl.xyz
alex-covalcova.space
socialfiguild.com
drnicholasreid.com
androidappprogrammierie.com
relatingtohumans.com
jitsystems.com
gbwpmz.com
lesaventuresdecocomango.com
wu8ggqdv077p.xyz
autnvg.com
wghakt016.xyz
lagosian.store
hilldoor.com
oculos-ajustavel-br.xyz
nameniboothac.com
lifuyao.com
cardinalsplayerstore.com
pholoniex-an.xyz
clarensis.com
wu8d616yyt6z.xyz
uidrp.com
gents.style
npwpkl.com
xn--kinsithrapeute-dkbe.xyz
cruzinu.xyz
raverwren.net
veuology.com
armbandtas.com
77xy.xyz
racingsilks-nft.com
academiademujerespro.com
makciakla.com
hopejustmade.com
catrionatowriss.com
kcebtaz.xyz
hongjunwuliu.com
vegecru.com
sidesofthenorth.com
buytacpyshop.xyz
nexuslanka.com
benormxukraine.xyz
hnart-child.com
globalrockstar.xyz
ilovesinglemoms.com
ollorhythm.com
ozkonyalikebap.com
kenmark-inc.com
recuerdosoxidados.com
interviewacomicnerd.com
have4grand.com
mcattoneys.com
ksherill.com
greenelectricmotors.com
matercenter.com
anwisystems.com
buylowatlanta.com
1stuebc.com
topbunkconsulting.com
heathlytrim.com
autnvg.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4360-136-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4360-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2188-154-0x0000000000870000-0x000000000089F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
new order pdf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Control Panel\International\Geo\Nation new order pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
new order pdf.exeRegSvcs.exerundll32.exedescription pid process target process PID 2280 set thread context of 4360 2280 new order pdf.exe RegSvcs.exe PID 4360 set thread context of 2660 4360 RegSvcs.exe Explorer.EXE PID 2188 set thread context of 2660 2188 rundll32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
new order pdf.exepowershell.exeRegSvcs.exerundll32.exepid process 2280 new order pdf.exe 2280 new order pdf.exe 5016 powershell.exe 4360 RegSvcs.exe 4360 RegSvcs.exe 4360 RegSvcs.exe 4360 RegSvcs.exe 5016 powershell.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2660 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exerundll32.exepid process 4360 RegSvcs.exe 4360 RegSvcs.exe 4360 RegSvcs.exe 2188 rundll32.exe 2188 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
new order pdf.exepowershell.exeRegSvcs.exerundll32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2280 new order pdf.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 4360 RegSvcs.exe Token: SeDebugPrivilege 2188 rundll32.exe Token: SeShutdownPrivilege 2660 Explorer.EXE Token: SeCreatePagefilePrivilege 2660 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
new order pdf.exeExplorer.EXErundll32.exedescription pid process target process PID 2280 wrote to memory of 5016 2280 new order pdf.exe powershell.exe PID 2280 wrote to memory of 5016 2280 new order pdf.exe powershell.exe PID 2280 wrote to memory of 5016 2280 new order pdf.exe powershell.exe PID 2280 wrote to memory of 5036 2280 new order pdf.exe schtasks.exe PID 2280 wrote to memory of 5036 2280 new order pdf.exe schtasks.exe PID 2280 wrote to memory of 5036 2280 new order pdf.exe schtasks.exe PID 2280 wrote to memory of 4360 2280 new order pdf.exe RegSvcs.exe PID 2280 wrote to memory of 4360 2280 new order pdf.exe RegSvcs.exe PID 2280 wrote to memory of 4360 2280 new order pdf.exe RegSvcs.exe PID 2280 wrote to memory of 4360 2280 new order pdf.exe RegSvcs.exe PID 2280 wrote to memory of 4360 2280 new order pdf.exe RegSvcs.exe PID 2280 wrote to memory of 4360 2280 new order pdf.exe RegSvcs.exe PID 2660 wrote to memory of 2188 2660 Explorer.EXE rundll32.exe PID 2660 wrote to memory of 2188 2660 Explorer.EXE rundll32.exe PID 2660 wrote to memory of 2188 2660 Explorer.EXE rundll32.exe PID 2188 wrote to memory of 3928 2188 rundll32.exe cmd.exe PID 2188 wrote to memory of 3928 2188 rundll32.exe cmd.exe PID 2188 wrote to memory of 3928 2188 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\new order pdf.exe"C:\Users\Admin\AppData\Local\Temp\new order pdf.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vEyBxaRI.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vEyBxaRI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFC66.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpFC66.tmpFilesize
1KB
MD577122ee5be27e07e9e9690cb3ed599b9
SHA100bc2c49ee7afeacf3318fdb17cb37aa3a937f40
SHA2569ba2b80924b24224f2308d076da024e2de92cdae28fa1150111b5b74e3cbb16f
SHA512bd8cf96c428dfc2061c8e573050ac60bd02c1aa12b08779099c45403f4cced185ccbfa3d276d825d8cb7f623042a6e710ce6cd26c628d1846962514e8016497d
-
memory/2188-161-0x0000000002670000-0x0000000002703000-memory.dmpFilesize
588KB
-
memory/2188-155-0x0000000002840000-0x0000000002B8A000-memory.dmpFilesize
3.3MB
-
memory/2188-154-0x0000000000870000-0x000000000089F000-memory.dmpFilesize
188KB
-
memory/2188-153-0x0000000000BB0000-0x0000000000BC4000-memory.dmpFilesize
80KB
-
memory/2188-151-0x0000000000000000-mapping.dmp
-
memory/2280-124-0x0000000000900000-0x0000000000982000-memory.dmpFilesize
520KB
-
memory/2280-125-0x0000000005A50000-0x0000000005FF4000-memory.dmpFilesize
5.6MB
-
memory/2280-126-0x0000000005360000-0x00000000053F2000-memory.dmpFilesize
584KB
-
memory/2280-127-0x0000000005320000-0x000000000532A000-memory.dmpFilesize
40KB
-
memory/2280-128-0x00000000076E0000-0x000000000777C000-memory.dmpFilesize
624KB
-
memory/2280-129-0x0000000009020000-0x0000000009086000-memory.dmpFilesize
408KB
-
memory/2660-143-0x0000000002E80000-0x0000000002F8F000-memory.dmpFilesize
1.1MB
-
memory/2660-162-0x0000000008160000-0x0000000008285000-memory.dmpFilesize
1.1MB
-
memory/3928-157-0x0000000000000000-mapping.dmp
-
memory/4360-135-0x0000000000000000-mapping.dmp
-
memory/4360-140-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4360-141-0x00000000018A0000-0x0000000001BEA000-memory.dmpFilesize
3.3MB
-
memory/4360-142-0x0000000001810000-0x0000000001824000-memory.dmpFilesize
80KB
-
memory/4360-136-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/5016-150-0x0000000007A40000-0x0000000007A5A000-memory.dmpFilesize
104KB
-
memory/5016-132-0x0000000002E00000-0x0000000002E36000-memory.dmpFilesize
216KB
-
memory/5016-147-0x0000000070C60000-0x0000000070CAC000-memory.dmpFilesize
304KB
-
memory/5016-148-0x0000000007890000-0x00000000078AE000-memory.dmpFilesize
120KB
-
memory/5016-149-0x0000000008080000-0x00000000086FA000-memory.dmpFilesize
6.5MB
-
memory/5016-137-0x00000000058E0000-0x0000000005902000-memory.dmpFilesize
136KB
-
memory/5016-145-0x00000000078B0000-0x00000000078E2000-memory.dmpFilesize
200KB
-
memory/5016-152-0x0000000007AB0000-0x0000000007ABA000-memory.dmpFilesize
40KB
-
memory/5016-134-0x0000000005A10000-0x0000000006038000-memory.dmpFilesize
6.2MB
-
memory/5016-146-0x00000000053D5000-0x00000000053D7000-memory.dmpFilesize
8KB
-
memory/5016-138-0x00000000060B0000-0x0000000006116000-memory.dmpFilesize
408KB
-
memory/5016-156-0x0000000007CC0000-0x0000000007D56000-memory.dmpFilesize
600KB
-
memory/5016-144-0x0000000005510000-0x000000000552E000-memory.dmpFilesize
120KB
-
memory/5016-158-0x0000000007C70000-0x0000000007C7E000-memory.dmpFilesize
56KB
-
memory/5016-159-0x0000000007D80000-0x0000000007D9A000-memory.dmpFilesize
104KB
-
memory/5016-160-0x0000000007D60000-0x0000000007D68000-memory.dmpFilesize
32KB
-
memory/5016-130-0x0000000000000000-mapping.dmp
-
memory/5036-131-0x0000000000000000-mapping.dmp