Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20230220-en
General
-
Target
invoice.exe
-
Size
624KB
-
MD5
fcf70baef57eab612fce7b21dc2a5410
-
SHA1
93c16bc1445bb7fcabbe32ec19653d5b849ba2f3
-
SHA256
a1fc12e0b11dc727c1e4f58da908d512b2ea1fb69cc317e024390440807d62eb
-
SHA512
c0eb203304c71897786162add97302546971ba758abdbefb5ce20293a453adba3a21fbe0abfb3af23943bd5cca3817463a5c63b1a1e313306f7fc1fd5dc2510a
-
SSDEEP
12288:HqUKm0e+ay2vZtiHDETS3AgRwbTKGpKO1:PKm0apvZt4DnAB6F
Malware Config
Extracted
formbook
4.1
m82
jamesdevereux.com
artificialturfminneapolis.com
hongmeiyan.com
lojaderoupasbr.com
yit.africa
austinrelocationexpert.com
saiva.page
exitsategy.com
chochonux.com
klosterbraeu-unterliezheim.com
byseymanur.com
sblwarwickshire.co.uk
brazimaid.com
ciogame.com
bronzesailing.com
dwkapl.xyz
022dyd.com
compassandpathwriting.com
alphabet1x.com
selfcleaninghairbrush.co.uk
power-bank.co.uk
kickskaart.com
baumanbilliardsnv.com
bestcp.net
doghospitalnearme.com
mixano.africa
helarybaber.online
illubio.com
ciutas.com
ldpr33.ru
killtheblacks.com
cassino-portugal.com
danhaii.com
gvtowingservice.com
let-travel.africa
dental-implants-67128.com
facetaxi.xyz
ctjh9u8e.vip
kyosaiohruri.com
executivepresencetrainer.com
greatharmony.africa
feelingsarereal.com
devopsuday.club
happiestminds-udemy.com
fittingstands.com
happyhousegarment.com
24daysofheaven.com
herhustlenation.com
xn--oy2b27nt6b.net
hothotcogixem.online
hausmeisterservice-berlin.net
hjddbb.com
stoutfamilychiro.com
bookishthoughtsbychristy.com
gibellinaheartquake.com
8cf1utrb6.xyz
patrick-daggitt.com
ebcbank.net
angel909reviews.com
arcteryxsouthafricaonline.com
cutematvhy.com
art2z.com
bulkforeverstamps.com
heatbling.com
despachocontablequinsa.com
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4544-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4544-145-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4544-152-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4840-154-0x0000000000F70000-0x0000000000F9F000-memory.dmp formbook behavioral2/memory/4840-158-0x0000000000F70000-0x0000000000F9F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
invoice.exeRegSvcs.exesystray.exedescription pid process target process PID 2028 set thread context of 4544 2028 invoice.exe RegSvcs.exe PID 4544 set thread context of 3212 4544 RegSvcs.exe Explorer.EXE PID 4544 set thread context of 3212 4544 RegSvcs.exe Explorer.EXE PID 4840 set thread context of 3212 4840 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
invoice.exeRegSvcs.exesystray.exepid process 2028 invoice.exe 2028 invoice.exe 4544 RegSvcs.exe 4544 RegSvcs.exe 4544 RegSvcs.exe 4544 RegSvcs.exe 4544 RegSvcs.exe 4544 RegSvcs.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe 4840 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RegSvcs.exesystray.exepid process 4544 RegSvcs.exe 4544 RegSvcs.exe 4544 RegSvcs.exe 4544 RegSvcs.exe 4840 systray.exe 4840 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
invoice.exeRegSvcs.exesystray.exedescription pid process Token: SeDebugPrivilege 2028 invoice.exe Token: SeDebugPrivilege 4544 RegSvcs.exe Token: SeDebugPrivilege 4840 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
invoice.exeExplorer.EXEsystray.exedescription pid process target process PID 2028 wrote to memory of 4544 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 4544 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 4544 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 4544 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 4544 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 4544 2028 invoice.exe RegSvcs.exe PID 3212 wrote to memory of 4840 3212 Explorer.EXE systray.exe PID 3212 wrote to memory of 4840 3212 Explorer.EXE systray.exe PID 3212 wrote to memory of 4840 3212 Explorer.EXE systray.exe PID 4840 wrote to memory of 4240 4840 systray.exe cmd.exe PID 4840 wrote to memory of 4240 4840 systray.exe cmd.exe PID 4840 wrote to memory of 4240 4840 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4240
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2028-134-0x0000000000360000-0x0000000000402000-memory.dmpFilesize
648KB
-
memory/2028-135-0x0000000005350000-0x00000000058F4000-memory.dmpFilesize
5.6MB
-
memory/2028-136-0x0000000004E40000-0x0000000004ED2000-memory.dmpFilesize
584KB
-
memory/2028-137-0x0000000004DE0000-0x0000000004DEA000-memory.dmpFilesize
40KB
-
memory/2028-138-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/2028-139-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/2028-140-0x00000000080C0000-0x000000000815C000-memory.dmpFilesize
624KB
-
memory/3212-163-0x0000000008D00000-0x0000000008E54000-memory.dmpFilesize
1.3MB
-
memory/3212-162-0x0000000008D00000-0x0000000008E54000-memory.dmpFilesize
1.3MB
-
memory/3212-160-0x0000000008D00000-0x0000000008E54000-memory.dmpFilesize
1.3MB
-
memory/3212-150-0x0000000008AA0000-0x0000000008C47000-memory.dmpFilesize
1.7MB
-
memory/3212-147-0x00000000081C0000-0x00000000082DD000-memory.dmpFilesize
1.1MB
-
memory/4544-149-0x0000000001020000-0x0000000001035000-memory.dmpFilesize
84KB
-
memory/4544-146-0x0000000000FC0000-0x0000000000FD5000-memory.dmpFilesize
84KB
-
memory/4544-152-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4544-145-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4544-143-0x0000000001060000-0x00000000013AA000-memory.dmpFilesize
3.3MB
-
memory/4544-141-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4840-153-0x0000000000DE0000-0x0000000000DE6000-memory.dmpFilesize
24KB
-
memory/4840-151-0x0000000000DE0000-0x0000000000DE6000-memory.dmpFilesize
24KB
-
memory/4840-154-0x0000000000F70000-0x0000000000F9F000-memory.dmpFilesize
188KB
-
memory/4840-155-0x0000000003040000-0x000000000338A000-memory.dmpFilesize
3.3MB
-
memory/4840-158-0x0000000000F70000-0x0000000000F9F000-memory.dmpFilesize
188KB
-
memory/4840-159-0x0000000002E80000-0x0000000002F14000-memory.dmpFilesize
592KB