Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 10:34
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice Ref_G51433980115....pdf.exe
Resource
win7-20220414-en
General
-
Target
Payment_Advice Ref_G51433980115....pdf.exe
-
Size
311KB
-
MD5
419fdeab3e062e913643037511fee430
-
SHA1
3c11f5dfdae578ab1e7afb87f05acf9477ee28cf
-
SHA256
76d45ff13654988781428940dab2825a158e15679d0f1faf9615b76a2cbff4a7
-
SHA512
2c108227bb344a271dec116251796049927a4df8fa7716d1b33a20df42fe840ac4f684e3af42bb64944d882bac06c90fd2217d6052cb3523667b3b3529c29a86
Malware Config
Extracted
formbook
3.9
ms20
ginayjasive.net
unique-bruce.com
marcaschingonas.net
artandartistonline.com
creditcubeaa.com
jnlunwen.com
adriangallop.com
gardenmebydjnui.com
dakdekker-utrecht.com
padmatrades.com
esseconsultingllc.com
heisenlintec.com
110431.info
posseco.com
team10hoodies.site
sciencewtour.com
paigeslife.com
idea-asesoria.com
crypotland.com
862575zk.info
lowerpowerbill-hvac.com
hrdrckni.com
dfhgh.com
abrokenmind.com
unijewelsllc.com
blog88.net
loteriasquinielas.com
unitedkingdomelectric.com
xyf677.com
protonsmasher.com
humblepiemaker.com
meijiaibao.com
ftsfinishingtouchsolutions.com
hqrcmodel.com
customrenovations-pa.com
yasuo0927.com
sigmasterconsulting.com
mycryptodex.com
cocoskyline.com
balloon-china.net
handbag.ink
wwwjiudu9.com
ballstothewalls.net
tankseam.com
anitbusinessclassairfareok.live
cascstech.com
411south9thstreet.info
forestfxdc.com
ihtilalmetin2.com
northernpharma.com
rntarafashionwear.com
mejoresofertasdehoy.com
portovaapartments.com
mclufpendryszlosent.win
theradmall.com
mcsosmedia.com
ordershoesth.com
humanecareer.com
093bch.info
drericortiz.com
bahankuemurah.com
thestoryofpines.com
hebeilanyan.net
suavidadeelite.com
regulars5.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1276-54-0x0000000000970000-0x00000000009C2000-memory.dmp formbook behavioral1/memory/1276-55-0x0000000000970000-0x00000000009C2000-memory.dmp formbook behavioral1/memory/1920-62-0x0000000000090000-0x00000000000BA000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1120 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KZTDUFWHVL = "C:\\Program Files (x86)\\Qzvqlxvc0\\configmfil_ru.exe" msiexec.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Payment_Advice Ref_G51433980115....pdf.exemsiexec.exedescription pid process target process PID 1276 set thread context of 1352 1276 Payment_Advice Ref_G51433980115....pdf.exe Explorer.EXE PID 1920 set thread context of 1352 1920 msiexec.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\Qzvqlxvc0\configmfil_ru.exe msiexec.exe -
Processes:
msiexec.exedescription ioc process Key created \Registry\User\S-1-5-21-790309383-526510583-3802439154-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
Payment_Advice Ref_G51433980115....pdf.exemsiexec.exepid process 1276 Payment_Advice Ref_G51433980115....pdf.exe 1276 Payment_Advice Ref_G51433980115....pdf.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe 1920 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Payment_Advice Ref_G51433980115....pdf.exemsiexec.exepid process 1276 Payment_Advice Ref_G51433980115....pdf.exe 1276 Payment_Advice Ref_G51433980115....pdf.exe 1276 Payment_Advice Ref_G51433980115....pdf.exe 1920 msiexec.exe 1920 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment_Advice Ref_G51433980115....pdf.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1276 Payment_Advice Ref_G51433980115....pdf.exe Token: SeDebugPrivilege 1920 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Explorer.EXEmsiexec.exedescription pid process target process PID 1352 wrote to memory of 1920 1352 Explorer.EXE msiexec.exe PID 1352 wrote to memory of 1920 1352 Explorer.EXE msiexec.exe PID 1352 wrote to memory of 1920 1352 Explorer.EXE msiexec.exe PID 1352 wrote to memory of 1920 1352 Explorer.EXE msiexec.exe PID 1352 wrote to memory of 1920 1352 Explorer.EXE msiexec.exe PID 1352 wrote to memory of 1920 1352 Explorer.EXE msiexec.exe PID 1352 wrote to memory of 1920 1352 Explorer.EXE msiexec.exe PID 1920 wrote to memory of 1120 1920 msiexec.exe cmd.exe PID 1920 wrote to memory of 1120 1920 msiexec.exe cmd.exe PID 1920 wrote to memory of 1120 1920 msiexec.exe cmd.exe PID 1920 wrote to memory of 1120 1920 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice Ref_G51433980115....pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice Ref_G51433980115....pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment_Advice Ref_G51433980115....pdf.exe"3⤵
- Deletes itself
PID:1120
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5c1412670faf573b78fb72a18c0f9268b
SHA112631bdfc81058f71e314873f2ef8123a51b300c
SHA256a39b1e6c33be6ca44ab7cd806b042336e452e9dba7562b63469c3f63f123193d
SHA5121bda000c08759238f323c8e211ce02ee717ed4ab41387e418f7e0f96483e19bceb5ec88daf8a835342a76b0394c42fce83187d21743b644593646ecfc1147abd
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf