Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2022 01:57
Static task
static1
Behavioral task
behavioral1
Sample
NUEVA ORDEN DE COMPRA.exe
Resource
win7-20220812-en
General
-
Target
NUEVA ORDEN DE COMPRA.exe
-
Size
1.0MB
-
MD5
491066406db17e15ba0856060cad6f53
-
SHA1
3a2951a74e6becf5d6ce1532542013e56509bb60
-
SHA256
b1a04015ced59584115a625dd19ee394005f911b108864b0bd834163d9c35181
-
SHA512
7c3a30eb1d7c0d2dcb188d089fd6325506820e804a6babab5b4723153fd50496cd78022e98ff1d513cd52c57ed561e9d88330462fd9aa60cfaca172912f2a15c
-
SSDEEP
12288:U+5owG3Z6UiGwas1dxk8ibzwhuJ3zps7FtdfmgHSvyUQ/v2FC/U/X0Mnw2gvJZ:U8Gw7dxkwuJNs7Zfm0SK9HH/U/0rvT
Malware Config
Extracted
formbook
4.1
de19
predictivemedicine.life
coloringforthepeople.com
project154.com
usmmexchange.com
bootzxon.com
chaoge730.com
thenaci.com
moviestarplent.com
musicallyengaged.com
sneakerspark.net
yudist.com
apqrcx.xyz
traceless.tel
guardlanavionics.com
usadogrights.com
openei.club
aventusluxury.com
telewebin.com
godrej-threeparks.net
solbysol.com
tarahomesolutions.com
riaairlines.com
berrygooddesigns.com
assistance-bouygues-telecom.com
s4hbgroupds.com
lago-vista-ata-martial-arts.com
icishopping.com
itkonsult.online
knightsbridgecdd.com
wrightstowntigers.com
gzxsb.com
teenanxiety.co
shanepisko.com
fftblogs.com
br-cleaning.plus
miami1688.cool
necomw.com
americanfreightsystemsinc.com
veirdmusic.com
brandnicer.com
ones77motiving.com
stephensthebakers.com
thaicomfortfood.com
mooreandsonsak.net
19838888.com
hay-yusspd-osaka-japan.life
junaidsubhani.tech
cadengineer.co.uk
camaratechsevilla.com
scholarsinfoguide.com
listcord.net
bossyoushu.com
robertkslaughter.xyz
locallywhitstable.co.uk
rsbtileinc.com
eviexo.com
lung-cancer-treatment-43816.com
lizandpeter.com
iberiahomes.institute
buyeber.net
hanarsedivy.com
fielsp.online
kuav7.com
1classlawncare.com
lanyuelou.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3472-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3472-151-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3752-158-0x0000000000F40000-0x0000000000F6F000-memory.dmp formbook behavioral2/memory/3752-168-0x0000000000F40000-0x0000000000F6F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation NUEVA ORDEN DE COMPRA.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4324 set thread context of 3472 4324 NUEVA ORDEN DE COMPRA.exe 91 PID 3472 set thread context of 3068 3472 RegSvcs.exe 29 PID 3752 set thread context of 3068 3752 netsh.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1724 powershell.exe 3472 RegSvcs.exe 3472 RegSvcs.exe 3472 RegSvcs.exe 3472 RegSvcs.exe 1724 powershell.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe 3752 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3472 RegSvcs.exe 3472 RegSvcs.exe 3472 RegSvcs.exe 3752 netsh.exe 3752 netsh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1724 powershell.exe Token: SeDebugPrivilege 3472 RegSvcs.exe Token: SeDebugPrivilege 3752 netsh.exe Token: SeShutdownPrivilege 3068 Explorer.EXE Token: SeCreatePagefilePrivilege 3068 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4324 wrote to memory of 1724 4324 NUEVA ORDEN DE COMPRA.exe 87 PID 4324 wrote to memory of 1724 4324 NUEVA ORDEN DE COMPRA.exe 87 PID 4324 wrote to memory of 1724 4324 NUEVA ORDEN DE COMPRA.exe 87 PID 4324 wrote to memory of 3592 4324 NUEVA ORDEN DE COMPRA.exe 89 PID 4324 wrote to memory of 3592 4324 NUEVA ORDEN DE COMPRA.exe 89 PID 4324 wrote to memory of 3592 4324 NUEVA ORDEN DE COMPRA.exe 89 PID 4324 wrote to memory of 3472 4324 NUEVA ORDEN DE COMPRA.exe 91 PID 4324 wrote to memory of 3472 4324 NUEVA ORDEN DE COMPRA.exe 91 PID 4324 wrote to memory of 3472 4324 NUEVA ORDEN DE COMPRA.exe 91 PID 4324 wrote to memory of 3472 4324 NUEVA ORDEN DE COMPRA.exe 91 PID 4324 wrote to memory of 3472 4324 NUEVA ORDEN DE COMPRA.exe 91 PID 4324 wrote to memory of 3472 4324 NUEVA ORDEN DE COMPRA.exe 91 PID 3068 wrote to memory of 3752 3068 Explorer.EXE 92 PID 3068 wrote to memory of 3752 3068 Explorer.EXE 92 PID 3068 wrote to memory of 3752 3068 Explorer.EXE 92 PID 3752 wrote to memory of 1168 3752 netsh.exe 93 PID 3752 wrote to memory of 1168 3752 netsh.exe 93 PID 3752 wrote to memory of 1168 3752 netsh.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\NUEVA ORDEN DE COMPRA.exe"C:\Users\Admin\AppData\Local\Temp\NUEVA ORDEN DE COMPRA.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QvCnhnqjS.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QvCnhnqjS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA5F4.tmp"3⤵
- Creates scheduled task(s)
PID:3592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5072f9827b63168dbe09a2eabf79e7853
SHA1255acbd31626f80078eca14b5e86ac0536a0458a
SHA25655ea99fc0a82e10de5eac19b0f39d4e7f76162d03f472f616e9732fb2ceaf82a
SHA5127d4f462d5933ccbaa40252b5d69342a541f9be504b0c786b428c7ad316b5d5b58222de11ad9169b1acc9573bbc84e0ab4a51a66ee588e9435236965580e3fbee