Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 01:18
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order Frank Manufactures.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Purchase Order Frank Manufactures.exe
Resource
win10v2004-20220721-en
General
-
Target
Purchase Order Frank Manufactures.exe
-
Size
1.3MB
-
MD5
32434444d1b2d9901449af917cf18c45
-
SHA1
f673c3a29258d7b0d540e6fb83c3d22059ad760b
-
SHA256
c47f67b3b696c414c6877e088c13cd6b569586f41fb8c0b4341276d6130546ce
-
SHA512
b994784d3228704f2ace28b7f0f2081cd83c4c8af1cbd4e6ee7fe4eea11b80cb7cd69ad451a04a37130eb7c79b55f6ee02c32e0cda249a5d9769ea13bbd0d7ee
Malware Config
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
Purchase Order Frank Manufactures.exeRegSvcs.exemstsc.exedescription pid process target process PID 2328 set thread context of 4304 2328 Purchase Order Frank Manufactures.exe RegSvcs.exe PID 4304 set thread context of 2464 4304 RegSvcs.exe Explorer.EXE PID 4776 set thread context of 2464 4776 mstsc.exe Explorer.EXE -
Processes:
mstsc.exedescription ioc process Key created \Registry\User\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
RegSvcs.exemstsc.exepid process 4304 RegSvcs.exe 4304 RegSvcs.exe 4304 RegSvcs.exe 4304 RegSvcs.exe 4304 RegSvcs.exe 4304 RegSvcs.exe 4304 RegSvcs.exe 4304 RegSvcs.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2464 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
RegSvcs.exemstsc.exepid process 4304 RegSvcs.exe 4304 RegSvcs.exe 4304 RegSvcs.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe 4776 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Purchase Order Frank Manufactures.exeRegSvcs.exemstsc.exedescription pid process Token: SeDebugPrivilege 2328 Purchase Order Frank Manufactures.exe Token: SeDebugPrivilege 4304 RegSvcs.exe Token: SeDebugPrivilege 4776 mstsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Purchase Order Frank Manufactures.exeExplorer.EXEmstsc.exedescription pid process target process PID 2328 wrote to memory of 4304 2328 Purchase Order Frank Manufactures.exe RegSvcs.exe PID 2328 wrote to memory of 4304 2328 Purchase Order Frank Manufactures.exe RegSvcs.exe PID 2328 wrote to memory of 4304 2328 Purchase Order Frank Manufactures.exe RegSvcs.exe PID 2328 wrote to memory of 4304 2328 Purchase Order Frank Manufactures.exe RegSvcs.exe PID 2328 wrote to memory of 4304 2328 Purchase Order Frank Manufactures.exe RegSvcs.exe PID 2328 wrote to memory of 4304 2328 Purchase Order Frank Manufactures.exe RegSvcs.exe PID 2464 wrote to memory of 4776 2464 Explorer.EXE mstsc.exe PID 2464 wrote to memory of 4776 2464 Explorer.EXE mstsc.exe PID 2464 wrote to memory of 4776 2464 Explorer.EXE mstsc.exe PID 4776 wrote to memory of 2812 4776 mstsc.exe Firefox.exe PID 4776 wrote to memory of 2812 4776 mstsc.exe Firefox.exe PID 4776 wrote to memory of 2812 4776 mstsc.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order Frank Manufactures.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Frank Manufactures.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2812
-
-