Analysis
-
max time kernel
153s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 14:57
Static task
static1
Behavioral task
behavioral1
Sample
ORDEN DE COMPRA DE DICIEMBRE pdf.exe
Resource
win7-20221111-en
General
-
Target
ORDEN DE COMPRA DE DICIEMBRE pdf.exe
-
Size
573KB
-
MD5
e5666f11a9f07f0b5754f6e24be28ee7
-
SHA1
df09902dda3e6917bed30d53505384b60dadfa0a
-
SHA256
dbbbb6acb1f5da76b3a7b03130d5e8235ac8fcb43f16fdb7e226bcc595fde196
-
SHA512
e14242f82ae798afdad460d99a70bc9977f8c566a7da6d19287b906b03b1e24425d7481fa5a4aa93cde9288bf6a7b3195f90147f28e7d6e76175fa4d4fb82caf
-
SSDEEP
12288:QqXGLLa1ptsstO8w0WRMCJO7BkFIqpwp:QqWvqhOsmIqpwp
Malware Config
Extracted
formbook
4.1
d0a7
ngpjqd.top
provider1.net
themetaverseloyalties.com
tylpp.com
pmjewels.com
87napxxgz8x86a.com
djolobal.com
fmbmaiamelo.com
naijabam.online
networkingbits.com
beesweet.live
sexarab.homes
promptcompete.com
midsouthradio.com
23mk.top
bnhkit.xyz
2ozp56.bond
vehiclesgroups.com
healthycommunitynow.com
cwzmesr.com
qpeqlqb.com
parallelsoundsstudio.com
legacy-lc.com
isedeonline.com
baudtown.com
characting.space
noironclothes.com
pisell.one
comnewcocoffee.com
bitvtag.live
hotelblunt.com
chryslercapitla.com
designrate.art
niacopeland.com
royaltyweb3.com
openai-good.com
mom.rent
brapix.app
pikkwik.com
omilive.com
whdmjse.com
belifprint.com
ncsex6.xyz
vrf70r.online
jbway.com
avtokozmetika.website
info-klar.com
zbk53.com
comfydays.shop
ismagency.biz
shm01.com
horzeplay.com
luxacumen.com
drpathcares.com
steamfulfillmentllc.com
board-evaluations.com
gecreditu.info
aquastarla.net
yjdfw.net
dhjzfs.com
theminco.biz
honeynoel.com
rzkbol.com
anastsy4.tech
botani-yodo1.xyz
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1720-69-0x000000000041F040-mapping.dmp formbook behavioral1/memory/1720-75-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/552-79-0x0000000000070000-0x000000000009F000-memory.dmp formbook behavioral1/memory/552-83-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ORDEN DE COMPRA DE DICIEMBRE pdf.exeRegSvcs.exewscript.exedescription pid process target process PID 892 set thread context of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 1720 set thread context of 1212 1720 RegSvcs.exe Explorer.EXE PID 552 set thread context of 1212 552 wscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
ORDEN DE COMPRA DE DICIEMBRE pdf.exeRegSvcs.exepowershell.exewscript.exepid process 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe 1720 RegSvcs.exe 1720 RegSvcs.exe 1508 powershell.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe 552 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exewscript.exepid process 1720 RegSvcs.exe 1720 RegSvcs.exe 1720 RegSvcs.exe 552 wscript.exe 552 wscript.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
ORDEN DE COMPRA DE DICIEMBRE pdf.exeRegSvcs.exepowershell.exewscript.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe Token: SeDebugPrivilege 1720 RegSvcs.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeDebugPrivilege 552 wscript.exe Token: SeShutdownPrivilege 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
ORDEN DE COMPRA DE DICIEMBRE pdf.exeExplorer.EXEwscript.exedescription pid process target process PID 892 wrote to memory of 1508 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe powershell.exe PID 892 wrote to memory of 1508 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe powershell.exe PID 892 wrote to memory of 1508 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe powershell.exe PID 892 wrote to memory of 1508 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe powershell.exe PID 892 wrote to memory of 1096 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe schtasks.exe PID 892 wrote to memory of 1096 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe schtasks.exe PID 892 wrote to memory of 1096 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe schtasks.exe PID 892 wrote to memory of 1096 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe schtasks.exe PID 892 wrote to memory of 1936 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1936 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1936 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1936 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1936 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1936 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1936 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 892 wrote to memory of 1720 892 ORDEN DE COMPRA DE DICIEMBRE pdf.exe RegSvcs.exe PID 1212 wrote to memory of 552 1212 Explorer.EXE wscript.exe PID 1212 wrote to memory of 552 1212 Explorer.EXE wscript.exe PID 1212 wrote to memory of 552 1212 Explorer.EXE wscript.exe PID 1212 wrote to memory of 552 1212 Explorer.EXE wscript.exe PID 552 wrote to memory of 1324 552 wscript.exe cmd.exe PID 552 wrote to memory of 1324 552 wscript.exe cmd.exe PID 552 wrote to memory of 1324 552 wscript.exe cmd.exe PID 552 wrote to memory of 1324 552 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\ORDEN DE COMPRA DE DICIEMBRE pdf.exe"C:\Users\Admin\AppData\Local\Temp\ORDEN DE COMPRA DE DICIEMBRE pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KiaSYgZ.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KiaSYgZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp54D5.tmp"3⤵
- Creates scheduled task(s)
PID:1096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1936
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp54D5.tmpFilesize
1KB
MD56e18041ec1afcb2c7f3a36b77f0fbc9e
SHA1de24fe8ba8d312111c50260c65415b9a7106d518
SHA2568f658737dc60e0034586af8f444de1fccd8c49072d644ea6b623953ce9317a0a
SHA5121a99527d4226fa860d35f39042d651629e16c501846ce6a7ac81e4005bd266fe500d24e8125f0137ca35c5de132cfaa6c270bec84e4ba7f4860aac81317ef20f
-
memory/552-78-0x0000000002220000-0x0000000002523000-memory.dmpFilesize
3.0MB
-
memory/552-83-0x0000000000070000-0x000000000009F000-memory.dmpFilesize
188KB
-
memory/552-81-0x00000000003C0000-0x0000000000454000-memory.dmpFilesize
592KB
-
memory/552-77-0x0000000000C60000-0x0000000000C86000-memory.dmpFilesize
152KB
-
memory/552-74-0x0000000000000000-mapping.dmp
-
memory/552-79-0x0000000000070000-0x000000000009F000-memory.dmpFilesize
188KB
-
memory/892-56-0x0000000000360000-0x0000000000376000-memory.dmpFilesize
88KB
-
memory/892-58-0x0000000007DE0000-0x0000000007E50000-memory.dmpFilesize
448KB
-
memory/892-55-0x0000000074D81000-0x0000000074D83000-memory.dmpFilesize
8KB
-
memory/892-54-0x0000000000970000-0x0000000000A06000-memory.dmpFilesize
600KB
-
memory/892-64-0x0000000005AE0000-0x0000000005B14000-memory.dmpFilesize
208KB
-
memory/892-57-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1096-61-0x0000000000000000-mapping.dmp
-
memory/1212-84-0x00000000042F0000-0x00000000043B5000-memory.dmpFilesize
788KB
-
memory/1212-73-0x0000000004DB0000-0x0000000004E88000-memory.dmpFilesize
864KB
-
memory/1212-82-0x00000000042F0000-0x00000000043B5000-memory.dmpFilesize
788KB
-
memory/1324-76-0x0000000000000000-mapping.dmp
-
memory/1508-59-0x0000000000000000-mapping.dmp
-
memory/1508-63-0x000000006E4F0000-0x000000006EA9B000-memory.dmpFilesize
5.7MB
-
memory/1508-80-0x000000006E4F0000-0x000000006EA9B000-memory.dmpFilesize
5.7MB
-
memory/1720-75-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1720-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1720-72-0x00000000002A0000-0x00000000002B5000-memory.dmpFilesize
84KB
-
memory/1720-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1720-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1720-69-0x000000000041F040-mapping.dmp
-
memory/1720-71-0x0000000000870000-0x0000000000B73000-memory.dmpFilesize
3.0MB