Analysis
-
max time kernel
153s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:08
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-#4536 ,pdf.exe
Resource
win7-20220414-en
General
-
Target
ORDER-#4536 ,pdf.exe
-
Size
504KB
-
MD5
6a094a17412972fa961de3851585c5d9
-
SHA1
d4c4f6f3dd9c59fad99b4a419b3b30f1b7c4bb15
-
SHA256
50f8d8b5cbbad3f2a1d4a25b84553ba285f49318ab3dbb8d436b6709582997e8
-
SHA512
6e05941dd561baaa89e74a7461247b5e83e3adab5e0ad6d26e796e8422ebc6fa617c0c8461cb97801e65693de50adc18b138c067d0a01a8b1c83567fff1740ba
Malware Config
Extracted
formbook
3.9
te
165whc.info
qdbfqfphjidqgtbttnq.com
theforceforsakens.com
septsix.com
meinnatura.com
markcici.com
rh-tv.com
yangzhie288.com
crystalent.biz
ipearlvoyager.com
depositvoucher.accountant
xn--g5ty9lgeu39hdrv5sm.com
newitemof.info
bombkitty.com
lewesdelawarerealestate.com
9c1nine.loan
ramrajindustries.com
standardpitbullpups.com
gentlestitches.com
dotruckbig.live
fenbf.win
111civicsquare-610.com
crisngrt.com
isolb.net
belmonthighpoint.com
marflaw.com
abeshashinkan.com
geodevconstruction.com
bradshawtccontracting.com
martinsappliance.net
kranche.com
fivestarsalute.com
needleyoudocumentary.com
kiranabharati.com
cxt-smart.com
mialmitala.com
mightymoversmd.com
mmluav27.com
lasanitariaortopedica.com
goldenics.com
jlzbtx.com
redadwords.com
uniqreap.com
cristao.top
ocak.info
badcredit-autoloans.loan
johanssonjohansson.com
plywoodhyderabad.com
berlinda-va.net
wanyizhigong.net
tuodqka.com
erinranney.com
inmoregistrocanarias.com
cupidstep.men
2070pe.com
lifeasanautismmomma.com
hbyrby.com
rideshareburlington.com
stjameseutawville.com
wizardmadness.com
youwillnevermoldalone.com
ifarm4u.com
craftyeducation.com
f-taxi-ai.com
flycoz.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-60-0x000000000041B680-mapping.dmp formbook behavioral1/memory/2020-59-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2020-62-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/1216-70-0x0000000000080000-0x00000000000AA000-memory.dmp formbook -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
mstsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mstsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\XTD8FTBPKB = "C:\\Program Files (x86)\\Ge0j8efe0\\Cookiesb8ftc.exe" mstsc.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2028 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ORDER-#4536 ,pdf.exeORDER-#4536 ,pdf.exemstsc.exedescription pid process target process PID 1008 set thread context of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 2020 set thread context of 1284 2020 ORDER-#4536 ,pdf.exe Explorer.EXE PID 1216 set thread context of 1284 1216 mstsc.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
mstsc.exedescription ioc process File opened for modification C:\Program Files (x86)\Ge0j8efe0\Cookiesb8ftc.exe mstsc.exe -
Processes:
mstsc.exedescription ioc process Key created \Registry\User\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
ORDER-#4536 ,pdf.exemstsc.exepid process 2020 ORDER-#4536 ,pdf.exe 2020 ORDER-#4536 ,pdf.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe 1216 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
ORDER-#4536 ,pdf.exemstsc.exepid process 2020 ORDER-#4536 ,pdf.exe 2020 ORDER-#4536 ,pdf.exe 2020 ORDER-#4536 ,pdf.exe 1216 mstsc.exe 1216 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ORDER-#4536 ,pdf.exemstsc.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2020 ORDER-#4536 ,pdf.exe Token: SeDebugPrivilege 1216 mstsc.exe Token: SeShutdownPrivilege 1284 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ORDER-#4536 ,pdf.exeExplorer.EXEmstsc.exedescription pid process target process PID 1008 wrote to memory of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 1008 wrote to memory of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 1008 wrote to memory of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 1008 wrote to memory of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 1008 wrote to memory of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 1008 wrote to memory of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 1008 wrote to memory of 2020 1008 ORDER-#4536 ,pdf.exe ORDER-#4536 ,pdf.exe PID 1284 wrote to memory of 1216 1284 Explorer.EXE mstsc.exe PID 1284 wrote to memory of 1216 1284 Explorer.EXE mstsc.exe PID 1284 wrote to memory of 1216 1284 Explorer.EXE mstsc.exe PID 1284 wrote to memory of 1216 1284 Explorer.EXE mstsc.exe PID 1216 wrote to memory of 2028 1216 mstsc.exe cmd.exe PID 1216 wrote to memory of 2028 1216 mstsc.exe cmd.exe PID 1216 wrote to memory of 2028 1216 mstsc.exe cmd.exe PID 1216 wrote to memory of 2028 1216 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\50N8002E\50Nlogim.jpegFilesize
73KB
MD56c46dc164f168c395b6e7b8660b83b5f
SHA13f802503862c5361a6ec9ca464f4031d2960793e
SHA256df32650cf67ddd19afc808e06bdc3d71ed5cf6520d2c2af09cae3434b696d3af
SHA5127f041cfbef0393532303d9e4a91cc19987d4e459195f8fdca518fc39f453b7ccd2ae318275c7c7cf8f3d78245aed5c328815dc8a43bddd096d1828f76b83c052
-
C:\Users\Admin\AppData\Roaming\50N8002E\50Nlogri.iniFilesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
C:\Users\Admin\AppData\Roaming\50N8002E\50Nlogrv.iniFilesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf
-
memory/1008-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmpFilesize
8KB
-
memory/1008-55-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/1216-72-0x0000000000AE0000-0x0000000000B73000-memory.dmpFilesize
588KB
-
memory/1216-66-0x0000000000000000-mapping.dmp
-
memory/1216-71-0x00000000021A0000-0x00000000024A3000-memory.dmpFilesize
3.0MB
-
memory/1216-70-0x0000000000080000-0x00000000000AA000-memory.dmpFilesize
168KB
-
memory/1216-69-0x0000000000C90000-0x0000000000D94000-memory.dmpFilesize
1.0MB
-
memory/1284-65-0x00000000049F0000-0x0000000004B4D000-memory.dmpFilesize
1.4MB
-
memory/1284-73-0x0000000006B20000-0x0000000006C4D000-memory.dmpFilesize
1.2MB
-
memory/2020-62-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2020-63-0x0000000000C10000-0x0000000000F13000-memory.dmpFilesize
3.0MB
-
memory/2020-64-0x0000000000180000-0x0000000000194000-memory.dmpFilesize
80KB
-
memory/2020-59-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2020-60-0x000000000041B680-mapping.dmp
-
memory/2020-57-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2020-56-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2028-68-0x0000000000000000-mapping.dmp