Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17/10/2022, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order number n° 20220741.exe
Resource
win7-20220812-en
General
-
Target
Purchase Order number n° 20220741.exe
-
Size
995KB
-
MD5
78555e148afa5a103c938dcd5da2293c
-
SHA1
e1a03ff97dd2ae0d2244c5694ec409de141b4d23
-
SHA256
ad7b11d538d1b3e39d30c7cd9523c744cd1dc061002aa38d0779b67c923b5945
-
SHA512
b50b7f929fceb85f30194595c86a371db00e3a5ecc92849fe06f177fbf5c5fbe01d5f0af9c79016de253c72da1ca80db0320fffc7a6aad5f640e7f68bfb133b1
-
SSDEEP
12288:9kY09G/Ju+/rXNzQTETwB9kzy7U0EAgcQVkN8Cs/jdv6cx:9kZG/Ju+T2ETK9+KU0UcACGv
Malware Config
Extracted
formbook
4.1
s11n
ugokk.com
webglobalmart.com
giapponetour.com
ericdhaun.com
sewozy33.com
bgw.info
montakcha.online
rayrung.com
thebranddesi.com
liamba.fun
whatismyipaddress.online
ggg9z-a1bzgkze.kred
greatowlbooks.site
sz1992.com
coolonebr.online
xhs782.vip
fizzell.site
dwpato.xyz
pelicankids.store
gopensum.com
ion.domains
xinshushop.top
innotech-prom.com
zanzendegiazadi.biz
guanglaij4.top
tbmy.net
perrobed.online
avantrend.net
jenntnutrition.com
pacfeed.com
katja-keller.com
lasonajhuriresort.com
hsepx.com
aneka1alt.com
natureondoor.com
copyrighthelpbusiness.net
sneakerhound.link
myarina.shop
paimon.pics
bfacosmetics.com
sensitivocuneo.com
brandingbyavi.com
samt.network
worldpeacemeditation.online
cokislokis.com
hellohold.store
escul-model.com
grayladderinteriors.com
euro-achat.com
kimhere.quest
thegreatdane.shop
cell-phone-deals-21621.com
kikyen.com
taraleighphotos.com
thamaraebruno.com
josephpennington.com
myhandl.com
newyearbalance.com
propcalculator.xyz
lyricatab.monster
exoticcoffee.shop
stylewithsoul.store
illumination.wiki
pitglass.online
fermedusaucet.com
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/1124-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1124-64-0x000000000041F080-mapping.dmp formbook behavioral1/memory/1124-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1124-73-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1660-75-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1660-80-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1548 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1248 set thread context of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1124 set thread context of 1444 1124 Purchase Order number n° 20220741.exe 11 PID 1124 set thread context of 1444 1124 Purchase Order number n° 20220741.exe 11 PID 1660 set thread context of 1444 1660 netsh.exe 11 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1124 Purchase Order number n° 20220741.exe 1124 Purchase Order number n° 20220741.exe 1124 Purchase Order number n° 20220741.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe 1660 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1124 Purchase Order number n° 20220741.exe 1124 Purchase Order number n° 20220741.exe 1124 Purchase Order number n° 20220741.exe 1124 Purchase Order number n° 20220741.exe 1660 netsh.exe 1660 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1124 Purchase Order number n° 20220741.exe Token: SeDebugPrivilege 1660 netsh.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1444 Explorer.EXE 1444 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1444 Explorer.EXE 1444 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1248 wrote to memory of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1248 wrote to memory of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1248 wrote to memory of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1248 wrote to memory of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1248 wrote to memory of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1248 wrote to memory of 1124 1248 Purchase Order number n° 20220741.exe 26 PID 1124 wrote to memory of 1660 1124 Purchase Order number n° 20220741.exe 27 PID 1124 wrote to memory of 1660 1124 Purchase Order number n° 20220741.exe 27 PID 1124 wrote to memory of 1660 1124 Purchase Order number n° 20220741.exe 27 PID 1124 wrote to memory of 1660 1124 Purchase Order number n° 20220741.exe 27 PID 1660 wrote to memory of 1548 1660 netsh.exe 28 PID 1660 wrote to memory of 1548 1660 netsh.exe 28 PID 1660 wrote to memory of 1548 1660 netsh.exe 28 PID 1660 wrote to memory of 1548 1660 netsh.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"5⤵
- Deletes itself
PID:1548
-
-
-
-