Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2023 08:09
Static task
static1
Behavioral task
behavioral1
Sample
Perfil de empresa y solicitud de pedido-pdf.exe
Resource
win7-20230220-en
General
-
Target
Perfil de empresa y solicitud de pedido-pdf.exe
-
Size
817KB
-
MD5
934b4aa04d107f3f1e4df18c1f4602c0
-
SHA1
78fd7a3ff4d72fc10dc2580ed51107d378a3917b
-
SHA256
be2d13c0a69ec836fb9e404b03dbfa04d7adb067ff00bda1375182dcc6bffa6f
-
SHA512
3071bea94409178dfc0a4d2107f435403bd1842ad6d899e933fbd8642aaa6f65d03fd6d4c0b0263b8c95ab4a42c594e9e5c4e1f72c26855529dd89feb4ebdc04
-
SSDEEP
24576:NuxnYfyuqYOEzbPDzse2IWZDNjpg2IRezTZ:Qh+yuOI0z9lNjp8RkZ
Malware Config
Extracted
formbook
4.1
il23
woodlandwoodworking.net
kitchen-deals-69155.com
hiddendia.xyz
xelaxaste.uk
sproutstrive.com
avlulu124.xyz
g-starnetwork.com
a-avdeeva.com
filmart.top
bustime411.com
besyor.xyz
joulex.live
christmastempjobsfinder.life
cxrh-official.com
themuzzy.co.uk
joshisarena.africa
dental4family.com
dietsandsixpacks.co.uk
innovativedigest.com
flyingphoenix.club
millenniumtutors.africa
ctsiholdings.com
1wincasino-online.gives
ficc2china.com
fodtt.africa
kx1339.com
duron.bet
credit-cards-52245.com
bbqdoner.ru
discovrbookings.com
guangoffical.buzz
newmanarts.africa
glamdupspasalon.com
dindaa.online
6n981.com
dovelyshop.com
20gaokk.com
dldlu.xyz
foruna-coachy.net
drsnowden.net
1wzzrr.top
signbyjot.net
bestmein23.com
cd00hui.shop
pasaportenica.net
electrolyte-drinks.site
healthyremedies.africa
creativedesigncompany.online
fhglobal-zhs.com
glasswashbasin.com
browyum.com
bet33080.com
aliceblomst.com
americanpressreleas.com
die-mietbar.com
kiahinternational.com
veganlifetony.com
ityrou.com
bnpbchain.cyou
fastandtrader.com
nerroir.com
galeritoto.com
adaptivetrading.solutions
chumeihome.net
aljaydeguzman.com
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/668-70-0x0000000000400000-0x0000000001462000-memory.dmp formbook behavioral1/memory/668-78-0x0000000000400000-0x0000000001462000-memory.dmp formbook behavioral1/memory/1360-81-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1360-83-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
Perfil de empresa y solicitud de pedido-pdf.exePerfil de empresa y solicitud de pedido-pdf.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Perfil de empresa y solicitud de pedido-pdf.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Perfil de empresa y solicitud de pedido-pdf.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1304 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exepid process 2000 Perfil de empresa y solicitud de pedido-pdf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exepid process 668 Perfil de empresa y solicitud de pedido-pdf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exePerfil de empresa y solicitud de pedido-pdf.exepid process 2000 Perfil de empresa y solicitud de pedido-pdf.exe 668 Perfil de empresa y solicitud de pedido-pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exePerfil de empresa y solicitud de pedido-pdf.exeraserver.exedescription pid process target process PID 2000 set thread context of 668 2000 Perfil de empresa y solicitud de pedido-pdf.exe Perfil de empresa y solicitud de pedido-pdf.exe PID 668 set thread context of 1252 668 Perfil de empresa y solicitud de pedido-pdf.exe Explorer.EXE PID 1360 set thread context of 1252 1360 raserver.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exeraserver.exepid process 668 Perfil de empresa y solicitud de pedido-pdf.exe 668 Perfil de empresa y solicitud de pedido-pdf.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe 1360 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1252 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exePerfil de empresa y solicitud de pedido-pdf.exeraserver.exepid process 2000 Perfil de empresa y solicitud de pedido-pdf.exe 668 Perfil de empresa y solicitud de pedido-pdf.exe 668 Perfil de empresa y solicitud de pedido-pdf.exe 668 Perfil de empresa y solicitud de pedido-pdf.exe 1360 raserver.exe 1360 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exeExplorer.EXEraserver.exedescription pid process Token: SeDebugPrivilege 668 Perfil de empresa y solicitud de pedido-pdf.exe Token: SeShutdownPrivilege 1252 Explorer.EXE Token: SeDebugPrivilege 1360 raserver.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1252 Explorer.EXE 1252 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1252 Explorer.EXE 1252 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Perfil de empresa y solicitud de pedido-pdf.exeExplorer.EXEraserver.exedescription pid process target process PID 2000 wrote to memory of 668 2000 Perfil de empresa y solicitud de pedido-pdf.exe Perfil de empresa y solicitud de pedido-pdf.exe PID 2000 wrote to memory of 668 2000 Perfil de empresa y solicitud de pedido-pdf.exe Perfil de empresa y solicitud de pedido-pdf.exe PID 2000 wrote to memory of 668 2000 Perfil de empresa y solicitud de pedido-pdf.exe Perfil de empresa y solicitud de pedido-pdf.exe PID 2000 wrote to memory of 668 2000 Perfil de empresa y solicitud de pedido-pdf.exe Perfil de empresa y solicitud de pedido-pdf.exe PID 2000 wrote to memory of 668 2000 Perfil de empresa y solicitud de pedido-pdf.exe Perfil de empresa y solicitud de pedido-pdf.exe PID 1252 wrote to memory of 1360 1252 Explorer.EXE raserver.exe PID 1252 wrote to memory of 1360 1252 Explorer.EXE raserver.exe PID 1252 wrote to memory of 1360 1252 Explorer.EXE raserver.exe PID 1252 wrote to memory of 1360 1252 Explorer.EXE raserver.exe PID 1360 wrote to memory of 1304 1360 raserver.exe cmd.exe PID 1360 wrote to memory of 1304 1360 raserver.exe cmd.exe PID 1360 wrote to memory of 1304 1360 raserver.exe cmd.exe PID 1360 wrote to memory of 1304 1360 raserver.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perfil de empresa y solicitud de pedido-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Perfil de empresa y solicitud de pedido-pdf.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Perfil de empresa y solicitud de pedido-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Perfil de empresa y solicitud de pedido-pdf.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Perfil de empresa y solicitud de pedido-pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nst2B66.tmp\System.dllFilesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
memory/668-75-0x0000000001470000-0x000000000363D000-memory.dmpFilesize
33.8MB
-
memory/668-78-0x0000000000400000-0x0000000001462000-memory.dmpFilesize
16.4MB
-
memory/668-76-0x0000000001470000-0x000000000363D000-memory.dmpFilesize
33.8MB
-
memory/668-66-0x0000000000400000-0x0000000001462000-memory.dmpFilesize
16.4MB
-
memory/668-67-0x0000000001470000-0x000000000363D000-memory.dmpFilesize
33.8MB
-
memory/668-68-0x0000000000400000-0x0000000001462000-memory.dmpFilesize
16.4MB
-
memory/668-70-0x0000000000400000-0x0000000001462000-memory.dmpFilesize
16.4MB
-
memory/668-71-0x0000000001470000-0x000000000363D000-memory.dmpFilesize
33.8MB
-
memory/668-72-0x0000000033870000-0x0000000033B73000-memory.dmpFilesize
3.0MB
-
memory/668-73-0x0000000033770000-0x0000000033784000-memory.dmpFilesize
80KB
-
memory/1252-74-0x0000000006AE0000-0x0000000006C83000-memory.dmpFilesize
1.6MB
-
memory/1252-86-0x0000000007210000-0x0000000007375000-memory.dmpFilesize
1.4MB
-
memory/1252-87-0x0000000007210000-0x0000000007375000-memory.dmpFilesize
1.4MB
-
memory/1252-90-0x0000000007210000-0x0000000007375000-memory.dmpFilesize
1.4MB
-
memory/1360-77-0x0000000000510000-0x000000000052C000-memory.dmpFilesize
112KB
-
memory/1360-80-0x0000000000510000-0x000000000052C000-memory.dmpFilesize
112KB
-
memory/1360-81-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/1360-82-0x00000000020A0000-0x00000000023A3000-memory.dmpFilesize
3.0MB
-
memory/1360-83-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/1360-85-0x0000000000530000-0x00000000005C3000-memory.dmpFilesize
588KB
-
memory/2000-65-0x0000000003060000-0x000000000522D000-memory.dmpFilesize
33.8MB
-
memory/2000-64-0x0000000003060000-0x000000000522D000-memory.dmpFilesize
33.8MB