Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2023, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20230220-en
General
-
Target
invoice.exe
-
Size
727KB
-
MD5
b0ca2f76a71ba322dab26bfb0eae3977
-
SHA1
f3e9c81c880ec14019280b6624e1092a65496b5a
-
SHA256
24380c6d7b340557a8e71c58078bd0ed311e3c42b975a75d23a0056210e2ad3e
-
SHA512
529eaf4481770e3940a8e3323ba9260485d9bf5a60632b7ecc38522b8ca39f94534ab8f073500839ae03600339830ae435a143b04a7a9ba46786764b2680cc19
-
SSDEEP
12288:EB6C6YN1PCGEDUuCkaRundIbjl7GlU+1FlQhLdzQEdCcZKW7/e3w:zLcLRunmfFmjnCCcZh7/e3w
Malware Config
Extracted
formbook
4.1
m82
jamesdevereux.com
artificialturfminneapolis.com
hongmeiyan.com
lojaderoupasbr.com
yit.africa
austinrelocationexpert.com
saiva.page
exitsategy.com
chochonux.com
klosterbraeu-unterliezheim.com
byseymanur.com
sblwarwickshire.co.uk
brazimaid.com
ciogame.com
bronzesailing.com
dwkapl.xyz
022dyd.com
compassandpathwriting.com
alphabet1x.com
selfcleaninghairbrush.co.uk
power-bank.co.uk
kickskaart.com
baumanbilliardsnv.com
bestcp.net
doghospitalnearme.com
mixano.africa
helarybaber.online
illubio.com
ciutas.com
ldpr33.ru
killtheblacks.com
cassino-portugal.com
danhaii.com
gvtowingservice.com
let-travel.africa
dental-implants-67128.com
facetaxi.xyz
ctjh9u8e.vip
kyosaiohruri.com
executivepresencetrainer.com
greatharmony.africa
feelingsarereal.com
devopsuday.club
happiestminds-udemy.com
fittingstands.com
happyhousegarment.com
24daysofheaven.com
herhustlenation.com
xn--oy2b27nt6b.net
hothotcogixem.online
hausmeisterservice-berlin.net
hjddbb.com
stoutfamilychiro.com
bookishthoughtsbychristy.com
gibellinaheartquake.com
8cf1utrb6.xyz
patrick-daggitt.com
ebcbank.net
angel909reviews.com
arcteryxsouthafricaonline.com
cutematvhy.com
art2z.com
bulkforeverstamps.com
heatbling.com
despachocontablequinsa.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/520-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/520-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/520-74-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/300-77-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/300-79-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 528 set thread context of 520 528 invoice.exe 33 PID 520 set thread context of 1200 520 RegSvcs.exe 14 PID 520 set thread context of 1200 520 RegSvcs.exe 14 PID 300 set thread context of 1200 300 wlanext.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 528 invoice.exe 528 invoice.exe 528 invoice.exe 528 invoice.exe 520 RegSvcs.exe 520 RegSvcs.exe 520 RegSvcs.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe 300 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 520 RegSvcs.exe 520 RegSvcs.exe 520 RegSvcs.exe 520 RegSvcs.exe 300 wlanext.exe 300 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 528 invoice.exe Token: SeDebugPrivilege 520 RegSvcs.exe Token: SeDebugPrivilege 300 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 528 wrote to memory of 736 528 invoice.exe 28 PID 528 wrote to memory of 736 528 invoice.exe 28 PID 528 wrote to memory of 736 528 invoice.exe 28 PID 528 wrote to memory of 736 528 invoice.exe 28 PID 528 wrote to memory of 580 528 invoice.exe 30 PID 528 wrote to memory of 580 528 invoice.exe 30 PID 528 wrote to memory of 580 528 invoice.exe 30 PID 528 wrote to memory of 580 528 invoice.exe 30 PID 528 wrote to memory of 580 528 invoice.exe 30 PID 528 wrote to memory of 580 528 invoice.exe 30 PID 528 wrote to memory of 580 528 invoice.exe 30 PID 528 wrote to memory of 1368 528 invoice.exe 31 PID 528 wrote to memory of 1368 528 invoice.exe 31 PID 528 wrote to memory of 1368 528 invoice.exe 31 PID 528 wrote to memory of 1368 528 invoice.exe 31 PID 528 wrote to memory of 1368 528 invoice.exe 31 PID 528 wrote to memory of 1368 528 invoice.exe 31 PID 528 wrote to memory of 1368 528 invoice.exe 31 PID 528 wrote to memory of 268 528 invoice.exe 32 PID 528 wrote to memory of 268 528 invoice.exe 32 PID 528 wrote to memory of 268 528 invoice.exe 32 PID 528 wrote to memory of 268 528 invoice.exe 32 PID 528 wrote to memory of 268 528 invoice.exe 32 PID 528 wrote to memory of 268 528 invoice.exe 32 PID 528 wrote to memory of 268 528 invoice.exe 32 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 528 wrote to memory of 520 528 invoice.exe 33 PID 1200 wrote to memory of 300 1200 Explorer.EXE 60 PID 1200 wrote to memory of 300 1200 Explorer.EXE 60 PID 1200 wrote to memory of 300 1200 Explorer.EXE 60 PID 1200 wrote to memory of 300 1200 Explorer.EXE 60 PID 300 wrote to memory of 1528 300 wlanext.exe 61 PID 300 wrote to memory of 1528 300 wlanext.exe 61 PID 300 wrote to memory of 1528 300 wlanext.exe 61 PID 300 wrote to memory of 1528 300 wlanext.exe 61
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ROfIBwzK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6E00.tmp"3⤵
- Creates scheduled task(s)
PID:736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵PID:580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵PID:1368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵PID:268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:284
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1764
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:672
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1852
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:108
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1708
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1576
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1792
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1564
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:552
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1948
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1892
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1780
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:740
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1232
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:524
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:768
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:620
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:980
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1788
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1080
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1152
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1288
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:816
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1040
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1664
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59cff0ca77a4ee5c901f1bd2e1b557f96
SHA1dd215876d2ac54f4d77761532b48eb4216ee3411
SHA2560d924cdf3f1a216880c7da02d16733092a072e541b39028b90629ae765da8223
SHA512d5ca6e9cbc7ec3e47c5d4ea29c19571495a4352c7f729c9821cd09f583a0713de2c80fd0f854a928f7805193b580ecaf16f7ca097c35821223f2ebed8c6af8b2