Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 10:55
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order PO045793 from Voile Trading Co.,Ltd.exe
Resource
win7-20220414-en
General
-
Target
Purchase order PO045793 from Voile Trading Co.,Ltd.exe
-
Size
320KB
-
MD5
b02fb2439cd88a5e399683f14d6d80ff
-
SHA1
7098d5175626c3bef989a7d0e0344158a752ebc4
-
SHA256
c6bed06259f7c50c2b15e8161d5b1fa11690e69a7e5bb3261202debfb7d96708
-
SHA512
aff2394e671e8f8b33d7bf5a4444590fb53c74a2f6bc29faf3627a467652f0d2d7f1bd22c420bd46621638ff2849c30be265b71ecce89b14f83a4d68b6cf78ba
Malware Config
Extracted
formbook
4.1
mw9
buyaii.com
zqdhrh.com
essentialsrefined.com
carbo-notifer.biz
cpahitr.com
westerntreasureseo.com
prowrestlingevent.com
hawthornbanksaves.com
vinhomes2.info
atriumindonesia.com
crunchinessretonation.com
masstorthedgefund.com
stroy-staleks.com
chinamarbleandtile.com
tv16878.info
hasegawa-takuma.com
cuxiaomao.com
umhhih.info
ieml.education
mwvllc.com
jaymeandjosh.com
marketer-daily-news.com
promt88.com
chandon.cloud
theworldisyour.com
txidrefnvd.com
flippingcrypto.com
excel-industrial.com
privateblockchain.party
thegodemcee.com
lino.ltd
louiscivitarese.com
blog-a-story.com
profesionalenfermeria.com
megacolorrun.com
discovertellus.com
492oum.info
eqodigital.com
cbdevonshire.com
ilovepura.com
rockychang.com
wrightsy.net
1d1onecome.men
nextdoorgaysex.com
miuyin.com
keieimail.com
coldwarcoldbrew.com
domesticworkload.loan
vadark.com
smgama.com
forever-sa.com
zarceb.site
rocycled.com
bryantaudioproductions.com
txneuqxgsodwteh.com
agrickly.com
86gmail.com
beijingfuxingbangda.com
qifeizuqiu.com
vanguardspark.info
t68w.com
zh7dpu.com
alfaperu.com
jameswjrobinson.net
chilogae.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2272-131-0x0000000004670000-0x0000000004770000-memory.dmp formbook behavioral2/memory/4924-139-0x00000000008A0000-0x00000000008CD000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Purchase order PO045793 from Voile Trading Co.,Ltd.exechkdsk.exedescription pid process target process PID 2272 set thread context of 3144 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe Explorer.EXE PID 4924 set thread context of 3144 4924 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
Purchase order PO045793 from Voile Trading Co.,Ltd.exechkdsk.exepid process 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe 4924 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3144 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Purchase order PO045793 from Voile Trading Co.,Ltd.exechkdsk.exepid process 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe 4924 chkdsk.exe 4924 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Purchase order PO045793 from Voile Trading Co.,Ltd.exeExplorer.EXEchkdsk.exedescription pid process Token: SeDebugPrivilege 2272 Purchase order PO045793 from Voile Trading Co.,Ltd.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeDebugPrivilege 4924 chkdsk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Explorer.EXEchkdsk.exedescription pid process target process PID 3144 wrote to memory of 4924 3144 Explorer.EXE chkdsk.exe PID 3144 wrote to memory of 4924 3144 Explorer.EXE chkdsk.exe PID 3144 wrote to memory of 4924 3144 Explorer.EXE chkdsk.exe PID 4924 wrote to memory of 2560 4924 chkdsk.exe cmd.exe PID 4924 wrote to memory of 2560 4924 chkdsk.exe cmd.exe PID 4924 wrote to memory of 2560 4924 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\Purchase order PO045793 from Voile Trading Co.,Ltd.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order PO045793 from Voile Trading Co.,Ltd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1316
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1404
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1424
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4692
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4664
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase order PO045793 from Voile Trading Co.,Ltd.exe"3⤵PID:2560
-
-