Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:41
Static task
static1
Behavioral task
behavioral1
Sample
Order InQuiry.exe
Resource
win7-20220414-en
General
-
Target
Order InQuiry.exe
-
Size
324KB
-
MD5
cbf04abfe31536e464fb853fd145a6de
-
SHA1
696d354f611589cf631371cdade86277ea5dc224
-
SHA256
e8172cbc3806d750d00a5619e618ffc068b9d8247b5f4da507642e70e32ac3f9
-
SHA512
2162acf2c67f8abdb8602f5acfa6495c028c9ad3bde95c869efa8445c2fea4c083d6bd6122e0061469fff1dcefb6eec420bc6165257a0ef5e19e855a475d78c1
Malware Config
Extracted
formbook
4.1
q5e
2177.ltd
thanxiety.com
max-width.com
fixti.net
mostmaj.com
mobilteknolojiuzmani.com
historyannals.com
wheelchairmotion.com
mossandmoonstonestudio.com
kastellifournis.com
axokey.net
peekl.com
metsteeshirt.com
abcfinancial-inc.com
btxrsp.com
amydh.com
ccoauthority.com
lumacorretora.com
kimfelixrealtor.com
iconext.biz
giftstgg.com
imonsanto.com
invoicefor.com
qfhxlw.com
wsykyy.com
gladius.network
peliculaslatino.online
timookflour.com
gxkuangjian.com
utvklj.men
rabota-v-avon.online
sheashealingway.com
thoitrangaoda.com
rytechweb.com
circuit69.com
crowd-design.biz
carosiandrhee.com
778d88.com
calvinkl.com
cjkit.com
jgkwhgxe.com
sanitascuadromedico.com
mellorangello.com
whiteinnocence.com
medtechdesignstudio.net
nurturingskin.com
guardyourweb.net
juw2017.com
jnheroes.com
damicosoftwaresystems.com
gesband.com
onwardsandupwards.info
gopropackaging.com
centerforaunts.com
sarrahshewdesign.com
intelligentcoach.net
iasisf.agency
products-news.com
calvinspring.com
100zan.site
9mahina.com
saleaustralianboots.com
floatinginfotech.com
calcinoneweek.com
yofdyk.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1488-59-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/1488-60-0x000000000041E2A0-mapping.dmp formbook behavioral1/memory/1488-65-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Order InQuiry.exeOrder InQuiry.exedescription pid process target process PID 960 set thread context of 1488 960 Order InQuiry.exe Order InQuiry.exe PID 1488 set thread context of 1368 1488 Order InQuiry.exe Explorer.EXE PID 1488 set thread context of 1368 1488 Order InQuiry.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Order InQuiry.exeOrder InQuiry.exepid process 960 Order InQuiry.exe 960 Order InQuiry.exe 960 Order InQuiry.exe 1488 Order InQuiry.exe 1488 Order InQuiry.exe 1488 Order InQuiry.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Order InQuiry.exepid process 1488 Order InQuiry.exe 1488 Order InQuiry.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order InQuiry.exeOrder InQuiry.exedescription pid process Token: SeDebugPrivilege 960 Order InQuiry.exe Token: SeDebugPrivilege 1488 Order InQuiry.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Order InQuiry.exedescription pid process target process PID 960 wrote to memory of 1488 960 Order InQuiry.exe Order InQuiry.exe PID 960 wrote to memory of 1488 960 Order InQuiry.exe Order InQuiry.exe PID 960 wrote to memory of 1488 960 Order InQuiry.exe Order InQuiry.exe PID 960 wrote to memory of 1488 960 Order InQuiry.exe Order InQuiry.exe PID 960 wrote to memory of 1488 960 Order InQuiry.exe Order InQuiry.exe PID 960 wrote to memory of 1488 960 Order InQuiry.exe Order InQuiry.exe PID 960 wrote to memory of 1488 960 Order InQuiry.exe Order InQuiry.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\Order InQuiry.exe"C:\Users\Admin\AppData\Local\Temp\Order InQuiry.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order InQuiry.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/960-54-0x0000000076571000-0x0000000076573000-memory.dmpFilesize
8KB
-
memory/960-55-0x0000000074940000-0x0000000074EEB000-memory.dmpFilesize
5.7MB
-
memory/1368-64-0x0000000004940000-0x0000000004A0F000-memory.dmpFilesize
828KB
-
memory/1368-67-0x0000000006A60000-0x0000000006BB3000-memory.dmpFilesize
1.3MB
-
memory/1488-56-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1488-57-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1488-59-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1488-60-0x000000000041E2A0-mapping.dmp
-
memory/1488-62-0x00000000008F0000-0x0000000000BF3000-memory.dmpFilesize
3.0MB
-
memory/1488-63-0x0000000000180000-0x0000000000194000-memory.dmpFilesize
80KB
-
memory/1488-65-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1488-66-0x0000000000220000-0x0000000000234000-memory.dmpFilesize
80KB