Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/03/2023, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
new order list.exe
Resource
win7-20230220-en
General
-
Target
new order list.exe
-
Size
730KB
-
MD5
0cfb2efa5a22c4cc99842471db6f415a
-
SHA1
83a61f8dffaa6aa5ed1959b6c1f2eb803b102a26
-
SHA256
2327b28e657d08e4b9db8e6523523c1b6898bdd4080bd26ad017e4f00d23a6c0
-
SHA512
a10efc13b736f8036346e7b34019bd57a07862623b5822e3eefa48427731ddf0fa55fee1aa2f9de170569371c397a4eed0a710915c1cee58361f72c9325b4378
-
SSDEEP
12288:pqdaPk2IkegET9jsIBMNjnNNOhAe/S0pE+tM5eo3BxXcYiI20t4AVYvSZE7GCGQe:p8xTsIBMNjnNNOhAe/S0DpWBmPI20mAd
Malware Config
Extracted
formbook
4.1
eu69
brightonbase.com
gamingcomputersunder1000.com
electriccarcharging.xyz
buysystems.co.uk
cansuk.online
smartykids-center.ru
gmmcustoms.com
klyrio.com
chemical-pomp-media.com
investorenprojekte.com
blogsaudeemdia.com
learning-m365.com
attache.gay
limpiezasturisticas.com
garagedoorprices.shop
amyzoellers.com
eguzkiagroup.com
phe.sk
efefhappen.buzz
raretables.co.uk
1takepass.com
lnntkj.com
dobermooninu.com
furrcious.com
di-casa.online
awayszhaohere.com
belindashop.top
fuckthesecunts.com
graphicplanetusa.com
alomeni.com
gcn5f.com
answeringthecallonline.com
eazyphotos.com
accuelend.com
getnegen.com
lenvera.com
majidshop.uk
ismakgroup-tr.com
easyclickmall.com
iwanterc.com
arm-mebel.ru
ag1ultra.com
discoverallcanada.com
antejstroy.ru
czacky.com
catkingdommeow.com
staffingcompany.co.uk
aidreamprints.com
gift-to-animal.com
creativejoinery.biz
blerdeblurb.com
davidksikorski.net
atthecornerof.com
jpwinner247.com
dafabetvn.info
annettearner.click
fwhtcgb.cyou
laserlogisticsinc.com
mediability.uk
scnuzk.com
brechoonline.app
tpdynamics.africa
hdrtalent.com
ciska.africa
kx2311.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1064-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1064-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/472-72-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/472-74-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 832 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1408 set thread context of 1064 1408 new order list.exe 29 PID 1064 set thread context of 1212 1064 new order list.exe 16 PID 472 set thread context of 1212 472 netsh.exe 16 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1408 new order list.exe 1064 new order list.exe 1064 new order list.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1064 new order list.exe 1064 new order list.exe 1064 new order list.exe 472 netsh.exe 472 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1408 new order list.exe Token: SeDebugPrivilege 1064 new order list.exe Token: SeDebugPrivilege 472 netsh.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1408 wrote to memory of 564 1408 new order list.exe 28 PID 1408 wrote to memory of 564 1408 new order list.exe 28 PID 1408 wrote to memory of 564 1408 new order list.exe 28 PID 1408 wrote to memory of 564 1408 new order list.exe 28 PID 1408 wrote to memory of 564 1408 new order list.exe 28 PID 1408 wrote to memory of 564 1408 new order list.exe 28 PID 1408 wrote to memory of 564 1408 new order list.exe 28 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1408 wrote to memory of 1064 1408 new order list.exe 29 PID 1212 wrote to memory of 472 1212 Explorer.EXE 30 PID 1212 wrote to memory of 472 1212 Explorer.EXE 30 PID 1212 wrote to memory of 472 1212 Explorer.EXE 30 PID 1212 wrote to memory of 472 1212 Explorer.EXE 30 PID 472 wrote to memory of 832 472 netsh.exe 31 PID 472 wrote to memory of 832 472 netsh.exe 31 PID 472 wrote to memory of 832 472 netsh.exe 31 PID 472 wrote to memory of 832 472 netsh.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\new order list.exe"C:\Users\Admin\AppData\Local\Temp\new order list.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\new order list.exe"{path}"3⤵PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\new order list.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\new order list.exe"3⤵
- Deletes itself
PID:832
-
-