Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 15:19
Static task
static1
Behavioral task
behavioral1
Sample
comutation order.exe
Resource
win7-20230220-en
General
-
Target
comutation order.exe
-
Size
744KB
-
MD5
d24b6d72e85c9b51bd5b39b9fe6d1ab5
-
SHA1
b2c1c8c1988924942a231cf30dfc5222b031090e
-
SHA256
e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5
-
SHA512
d37ff374ab0f381051e8e1c27d4b181a57e62fa3f8775616739421261b7032f94ec229b84c0f0a686bbbce95f69e7a2b2a0269239773c7dc76ff0f01ce8c9b6e
-
SSDEEP
12288:iQu6zWFuIRiPLFuJVygB1VrQ6GSItioHVnwlb1:iSIuIwZwAgrVr6NHFwlb
Malware Config
Extracted
formbook
4.1
n13e
cowiemarketing.com
uniqueliquidz.co.uk
755259.com
7bw95.com
luxbarstools.co.uk
baccaratda.com
berkayakpinar.xyz
gistus.africa
hjd387.com
leave-fly.com
golfclubdaddy.com
engineeringea.buzz
countryrevisited.com
decoracioneskalite.com
imaginationlirbary.com
moneytransfer.africa
brainwaveproject.com
3039sjbqf2022.com
184hotels.com
aromamiaro.com
bigching.com
armkette.com
energytechnicalsystems.com
bodw2022.com
keptpasha.online
fossillandstone.com
guioueui.link
cleanupbycmw.com
inyeculinary.com
papercrochet.net
jaderoadfarm.com
bril-leadinginvention.com
dtgwarehouse.com
successrn.net
660web.com
lovedhug.com
juicecomedy.co.uk
enigmaxk.com
romunro.net
cassiekayreads.com
ibuycomputers.com
blossomblushbelltents.co.uk
hjce06.com
applyingdreams.com
h2ghb3.site
glown.africa
533671.com
charlottechoicelimos.com
bossinfra.com
anrovlp.xyz
1wqzsb.top
ertfsdf.xyz
exotico-store.com
betterportions.com
corfix.app
888sq.club
takeselfies.net
getyourtitleback.com
clickadega.com
midwestflowsproductions.net
duraveritaswines.com
dublintwist.com
apollobenfitservices.com
kp-aodeli.com
davidmchughroofing.co.uk
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2096-143-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2096-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2096-154-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5088-156-0x0000000000970000-0x000000000099F000-memory.dmp formbook behavioral2/memory/5088-158-0x0000000000970000-0x000000000099F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
comutation order.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation comutation order.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
comutation order.execomutation order.execscript.exedescription pid process target process PID 2132 set thread context of 2096 2132 comutation order.exe comutation order.exe PID 2096 set thread context of 2600 2096 comutation order.exe Explorer.EXE PID 2096 set thread context of 2600 2096 comutation order.exe Explorer.EXE PID 5088 set thread context of 2600 5088 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
comutation order.execscript.exepid process 2096 comutation order.exe 2096 comutation order.exe 2096 comutation order.exe 2096 comutation order.exe 2096 comutation order.exe 2096 comutation order.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe 5088 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2600 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
comutation order.execscript.exepid process 2096 comutation order.exe 2096 comutation order.exe 2096 comutation order.exe 2096 comutation order.exe 5088 cscript.exe 5088 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
comutation order.execscript.exedescription pid process Token: SeDebugPrivilege 2096 comutation order.exe Token: SeDebugPrivilege 5088 cscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
comutation order.exeExplorer.EXEcscript.exedescription pid process target process PID 2132 wrote to memory of 1236 2132 comutation order.exe schtasks.exe PID 2132 wrote to memory of 1236 2132 comutation order.exe schtasks.exe PID 2132 wrote to memory of 1236 2132 comutation order.exe schtasks.exe PID 2132 wrote to memory of 2096 2132 comutation order.exe comutation order.exe PID 2132 wrote to memory of 2096 2132 comutation order.exe comutation order.exe PID 2132 wrote to memory of 2096 2132 comutation order.exe comutation order.exe PID 2132 wrote to memory of 2096 2132 comutation order.exe comutation order.exe PID 2132 wrote to memory of 2096 2132 comutation order.exe comutation order.exe PID 2132 wrote to memory of 2096 2132 comutation order.exe comutation order.exe PID 2600 wrote to memory of 5088 2600 Explorer.EXE cscript.exe PID 2600 wrote to memory of 5088 2600 Explorer.EXE cscript.exe PID 2600 wrote to memory of 5088 2600 Explorer.EXE cscript.exe PID 5088 wrote to memory of 1352 5088 cscript.exe cmd.exe PID 5088 wrote to memory of 1352 5088 cscript.exe cmd.exe PID 5088 wrote to memory of 1352 5088 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\comutation order.exe"C:\Users\Admin\AppData\Local\Temp\comutation order.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\urCbmGUnZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEBCC.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\comutation order.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\comutation order.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpEBCC.tmpFilesize
1KB
MD515c6c27a92c01961802c16f901711cd2
SHA1ca5c9bb271cbc447e9ec8e6ce2e28aacf85eb174
SHA256f9e5a6d075d9819f2b522dc731a274b175626a5b605dabb0d23a62a687fb3c29
SHA5127722c2293f693cf48ff5416e8ba73362c1a7bfabc501940a55ee6e0800d81fd5d8e240cf69c2ddaf0e790de6db426352901d6d6278995abe86ffaf06b23fac83
-
memory/2096-151-0x0000000003670000-0x0000000003684000-memory.dmpFilesize
80KB
-
memory/2096-147-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2096-154-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2096-148-0x0000000001CF0000-0x0000000001D04000-memory.dmpFilesize
80KB
-
memory/2096-146-0x00000000019A0000-0x0000000001CEA000-memory.dmpFilesize
3.3MB
-
memory/2096-143-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2132-136-0x0000000004D80000-0x0000000004E1C000-memory.dmpFilesize
624KB
-
memory/2132-139-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/2132-138-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/2132-137-0x0000000004C70000-0x0000000004C7A000-memory.dmpFilesize
40KB
-
memory/2132-135-0x0000000004CE0000-0x0000000004D72000-memory.dmpFilesize
584KB
-
memory/2132-133-0x0000000000220000-0x00000000002E0000-memory.dmpFilesize
768KB
-
memory/2132-134-0x0000000005290000-0x0000000005834000-memory.dmpFilesize
5.6MB
-
memory/2600-149-0x00000000025D0000-0x00000000026E2000-memory.dmpFilesize
1.1MB
-
memory/2600-152-0x0000000007AB0000-0x0000000007C28000-memory.dmpFilesize
1.5MB
-
memory/2600-161-0x0000000008910000-0x0000000008A4D000-memory.dmpFilesize
1.2MB
-
memory/2600-162-0x0000000008910000-0x0000000008A4D000-memory.dmpFilesize
1.2MB
-
memory/2600-164-0x0000000008910000-0x0000000008A4D000-memory.dmpFilesize
1.2MB
-
memory/5088-153-0x0000000000DB0000-0x0000000000DD7000-memory.dmpFilesize
156KB
-
memory/5088-155-0x0000000000DB0000-0x0000000000DD7000-memory.dmpFilesize
156KB
-
memory/5088-156-0x0000000000970000-0x000000000099F000-memory.dmpFilesize
188KB
-
memory/5088-157-0x0000000002B40000-0x0000000002E8A000-memory.dmpFilesize
3.3MB
-
memory/5088-158-0x0000000000970000-0x000000000099F000-memory.dmpFilesize
188KB
-
memory/5088-160-0x0000000002940000-0x00000000029D3000-memory.dmpFilesize
588KB