Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order number n° 20220741.exe
Resource
win7-20220812-en
General
-
Target
Purchase Order number n° 20220741.exe
-
Size
995KB
-
MD5
78555e148afa5a103c938dcd5da2293c
-
SHA1
e1a03ff97dd2ae0d2244c5694ec409de141b4d23
-
SHA256
ad7b11d538d1b3e39d30c7cd9523c744cd1dc061002aa38d0779b67c923b5945
-
SHA512
b50b7f929fceb85f30194595c86a371db00e3a5ecc92849fe06f177fbf5c5fbe01d5f0af9c79016de253c72da1ca80db0320fffc7a6aad5f640e7f68bfb133b1
-
SSDEEP
12288:9kY09G/Ju+/rXNzQTETwB9kzy7U0EAgcQVkN8Cs/jdv6cx:9kZG/Ju+T2ETK9+KU0UcACGv
Malware Config
Extracted
formbook
4.1
s11n
ugokk.com
webglobalmart.com
giapponetour.com
ericdhaun.com
sewozy33.com
bgw.info
montakcha.online
rayrung.com
thebranddesi.com
liamba.fun
whatismyipaddress.online
ggg9z-a1bzgkze.kred
greatowlbooks.site
sz1992.com
coolonebr.online
xhs782.vip
fizzell.site
dwpato.xyz
pelicankids.store
gopensum.com
ion.domains
xinshushop.top
innotech-prom.com
zanzendegiazadi.biz
guanglaij4.top
tbmy.net
perrobed.online
avantrend.net
jenntnutrition.com
pacfeed.com
katja-keller.com
lasonajhuriresort.com
hsepx.com
aneka1alt.com
natureondoor.com
copyrighthelpbusiness.net
sneakerhound.link
myarina.shop
paimon.pics
bfacosmetics.com
sensitivocuneo.com
brandingbyavi.com
samt.network
worldpeacemeditation.online
cokislokis.com
hellohold.store
escul-model.com
grayladderinteriors.com
euro-achat.com
kimhere.quest
thegreatdane.shop
cell-phone-deals-21621.com
kikyen.com
taraleighphotos.com
thamaraebruno.com
josephpennington.com
myhandl.com
newyearbalance.com
propcalculator.xyz
lyricatab.monster
exoticcoffee.shop
stylewithsoul.store
illumination.wiki
pitglass.online
fermedusaucet.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3172-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3172-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4848-147-0x0000000000810000-0x000000000083F000-memory.dmp formbook behavioral2/memory/4848-152-0x0000000000810000-0x000000000083F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2276 set thread context of 3172 2276 Purchase Order number n° 20220741.exe 88 PID 3172 set thread context of 3056 3172 Purchase Order number n° 20220741.exe 41 PID 4848 set thread context of 3056 4848 rundll32.exe 41 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3172 Purchase Order number n° 20220741.exe 3172 Purchase Order number n° 20220741.exe 3172 Purchase Order number n° 20220741.exe 3172 Purchase Order number n° 20220741.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe 4848 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3172 Purchase Order number n° 20220741.exe 3172 Purchase Order number n° 20220741.exe 3172 Purchase Order number n° 20220741.exe 4848 rundll32.exe 4848 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3172 Purchase Order number n° 20220741.exe Token: SeDebugPrivilege 4848 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3172 2276 Purchase Order number n° 20220741.exe 88 PID 2276 wrote to memory of 3172 2276 Purchase Order number n° 20220741.exe 88 PID 2276 wrote to memory of 3172 2276 Purchase Order number n° 20220741.exe 88 PID 2276 wrote to memory of 3172 2276 Purchase Order number n° 20220741.exe 88 PID 2276 wrote to memory of 3172 2276 Purchase Order number n° 20220741.exe 88 PID 2276 wrote to memory of 3172 2276 Purchase Order number n° 20220741.exe 88 PID 3056 wrote to memory of 4848 3056 Explorer.EXE 89 PID 3056 wrote to memory of 4848 3056 Explorer.EXE 89 PID 3056 wrote to memory of 4848 3056 Explorer.EXE 89 PID 4848 wrote to memory of 4576 4848 rundll32.exe 90 PID 4848 wrote to memory of 4576 4848 rundll32.exe 90 PID 4848 wrote to memory of 4576 4848 rundll32.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order number n° 20220741.exe"3⤵PID:4576
-
-