Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
inquiry order_details.com.exe
Resource
win7-20220812-en
General
-
Target
inquiry order_details.com.exe
-
Size
876KB
-
MD5
e6d120871246c094004ec3b84f1102eb
-
SHA1
9404257730a1c4d5db6b4a27350614b1ba840211
-
SHA256
59162d6533d5d56ceedd3f8a24e85e75cd198c72db5719188a4a582752d7fbe4
-
SHA512
8fce77b46cf277920b6b884faba48d73be8ca9c5cbcc52d551437020c7bd6d22946f61b89f943062cd41fb5d5484e995e8075d3efca8c57b7b50258b1c0a7add
-
SSDEEP
12288:1gdxTv//+Yuk+Ad+jGObj/Kjx2WJ2YPfOvESqLRrSfN9YnZNM0MSvhh7LUQw:10PTbTOvY21YHO8dS1Cn/M0MSvfS
Malware Config
Extracted
formbook
4.1
jn85
106c6423c3.com
vittoriospumpherston.co.uk
furniture-best.com
employersfindme.online
colegioagustinruiz.com
fuziservice.com
differentlokal.com
azzfasst.com
kerncereus.online
johnschottllc.com
disembark-burgeoned.click
cabliviwarranty.com
justzionism.com
diplomy-ua.top
cloudadonis.com
vaalepoxies.africa
ky2088.vip
gsportal.africa
alphastrength-us.com
homerams.com
yelkovan.app
footballresults.website
shopjollybox.co.uk
arshisboutique.com
adef-residence.com
bigmoneypitch.com
reconectar.net
dolus-cularivan.sbs
glsqqq.top
danielaswaebe-gma.com
aimannammara.com
hongyuexiecai.com
controlspaigive.com
boehlyelectronics.com
buylikeking.com
baamodels.com
family-doctor-47453.com
gztx020.com
thefrenchobsession.net
hivebev.com
162988.net
wfg.africa
grafisk-formgivning-kurs.click
hucan56.com
prodentimtry.net
globalfinance.shop
julianagreenhousesdirect.co.uk
cesaralopez.com
amsgroupinternational.net
bahaplus.com
christmostree.shop
autenticromanescgera.com
clippersbrshop.com
wertoz.xyz
diingkuen.net
juicers.pro
38413.net
fedexaus.top
beingabroad.store
24-02-2022.site
agenrusia777.day
doloresurquiza.com
aquariumwalking.com
6n876.com
lkyfzzzyhzslhs.net
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/952-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/952-63-0x000000000041F130-mapping.dmp formbook behavioral1/memory/952-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/952-73-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1664-75-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1664-80-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 276 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1264 set thread context of 952 1264 inquiry order_details.com.exe 28 PID 952 set thread context of 1232 952 inquiry order_details.com.exe 16 PID 952 set thread context of 1232 952 inquiry order_details.com.exe 16 PID 1664 set thread context of 1232 1664 wininit.exe 16 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 952 inquiry order_details.com.exe 952 inquiry order_details.com.exe 952 inquiry order_details.com.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe 1664 wininit.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 952 inquiry order_details.com.exe 952 inquiry order_details.com.exe 952 inquiry order_details.com.exe 952 inquiry order_details.com.exe 1664 wininit.exe 1664 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 952 inquiry order_details.com.exe Token: SeDebugPrivilege 1664 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1264 wrote to memory of 952 1264 inquiry order_details.com.exe 28 PID 1264 wrote to memory of 952 1264 inquiry order_details.com.exe 28 PID 1264 wrote to memory of 952 1264 inquiry order_details.com.exe 28 PID 1264 wrote to memory of 952 1264 inquiry order_details.com.exe 28 PID 1264 wrote to memory of 952 1264 inquiry order_details.com.exe 28 PID 1264 wrote to memory of 952 1264 inquiry order_details.com.exe 28 PID 1264 wrote to memory of 952 1264 inquiry order_details.com.exe 28 PID 1232 wrote to memory of 1664 1232 Explorer.EXE 29 PID 1232 wrote to memory of 1664 1232 Explorer.EXE 29 PID 1232 wrote to memory of 1664 1232 Explorer.EXE 29 PID 1232 wrote to memory of 1664 1232 Explorer.EXE 29 PID 1664 wrote to memory of 276 1664 wininit.exe 30 PID 1664 wrote to memory of 276 1664 wininit.exe 30 PID 1664 wrote to memory of 276 1664 wininit.exe 30 PID 1664 wrote to memory of 276 1664 wininit.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\inquiry order_details.com.exe"C:\Users\Admin\AppData\Local\Temp\inquiry order_details.com.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\inquiry order_details.com.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\inquiry order_details.com.exe"3⤵
- Deletes itself
PID:276
-
-