Analysis
-
max time kernel
185s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
order SEP.exe
Resource
win7-20220414-en
General
-
Target
order SEP.exe
-
Size
394KB
-
MD5
7e17022d4cb372a3a853feedcd918d90
-
SHA1
ad69c5d385a4d7156c8ff3eeb2379739c53ded02
-
SHA256
3a7e2e98243c188fbda3734b22856c30febb41d1f7e0ddbc034906288aa72dae
-
SHA512
0fa20e95892462768517fbacf5df0b62258d9a8f9f5bab521962571b49a9d50353042e48cbf2bc2ff1af300d62adfbe9cf34d3ea4e92eb0b8d090ccbd7c00692
Malware Config
Extracted
formbook
4.0
g8u
stuition.com
mj-sculpture.com
cannatainmentevents.com
dianjintang.com
rmlusitania.info
effet-spiruline.com
flatheme.com
supergaminator-vip.com
craftyourmagic.com
lakai.ltd
electionshawaii.com
iqpdct.com
thebestfourstarhotels.com
satoshiceo.com
saintmartiner.com
brothersmarinetoronto.com
citicoin.online
scentsationalsniffers.com
hellonighbourgameees.com
displayonline-france.com
cait-compare.com
aprenderoratoria.com
stehtisch24.com
cocktailandcocktalk.com
hybridtablesaw.com
ynnkfs.com
capitolman.com
xccomm.com
dannyhustle.com
9jiuhao.com
ossigenopoliatomicoliquido.biz
casayards.com
hotelmesonreal.com
lffcfftl.com
raiserobo.com
ssav33.com
oceanicmarinerisks.com
star-fairtrading.com
universecoolest.com
www8557v.com
reparaciones-ordenadores.com
residenteyecarepa.com
x-hom.com
finestsalon.com
xn--n8jydrczh8g7f7a7lp527d.com
dallasfortworthseopro.com
talentsplanner.com
gdmen.com
life-insurer-zone.live
tunnelrobot.com
vietnamexport.net
inlishui.site
inaneufeld.com
sleepingsling.com
huaian.ltd
iluxol.com
mahavirjwellersnoida.com
fastaskme.men
rsinsur.com
datingevo.com
bringmesomething.online
banjiasanti.com
zhixinchain.net
medifloors.com
tromagy.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4392-135-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/4416-143-0x0000000000710000-0x000000000073D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
order SEP.exeorder SEP.exesvchost.exedescription pid process target process PID 4240 set thread context of 4392 4240 order SEP.exe order SEP.exe PID 4392 set thread context of 3232 4392 order SEP.exe Explorer.EXE PID 4416 set thread context of 3232 4416 svchost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
order SEP.exeorder SEP.exesvchost.exepid process 4240 order SEP.exe 4240 order SEP.exe 4240 order SEP.exe 4392 order SEP.exe 4392 order SEP.exe 4392 order SEP.exe 4392 order SEP.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe 4416 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3232 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
order SEP.exesvchost.exepid process 4392 order SEP.exe 4392 order SEP.exe 4392 order SEP.exe 4416 svchost.exe 4416 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
order SEP.exeorder SEP.exesvchost.exedescription pid process Token: SeDebugPrivilege 4240 order SEP.exe Token: SeDebugPrivilege 4392 order SEP.exe Token: SeDebugPrivilege 4416 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
order SEP.exeExplorer.EXEsvchost.exedescription pid process target process PID 4240 wrote to memory of 4392 4240 order SEP.exe order SEP.exe PID 4240 wrote to memory of 4392 4240 order SEP.exe order SEP.exe PID 4240 wrote to memory of 4392 4240 order SEP.exe order SEP.exe PID 4240 wrote to memory of 4392 4240 order SEP.exe order SEP.exe PID 4240 wrote to memory of 4392 4240 order SEP.exe order SEP.exe PID 4240 wrote to memory of 4392 4240 order SEP.exe order SEP.exe PID 3232 wrote to memory of 4416 3232 Explorer.EXE svchost.exe PID 3232 wrote to memory of 4416 3232 Explorer.EXE svchost.exe PID 3232 wrote to memory of 4416 3232 Explorer.EXE svchost.exe PID 4416 wrote to memory of 1364 4416 svchost.exe cmd.exe PID 4416 wrote to memory of 1364 4416 svchost.exe cmd.exe PID 4416 wrote to memory of 1364 4416 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\order SEP.exe"C:\Users\Admin\AppData\Local\Temp\order SEP.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\order SEP.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\order SEP.exe"3⤵PID:1364
-
-