Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
Quotation-pdf-.exe
Resource
win7-20230220-en
General
-
Target
Quotation-pdf-.exe
-
Size
744KB
-
MD5
e7f1724ccbb35d49d7fe3adbeffd161f
-
SHA1
2fbe4e683985d358bddc51656fe6d67b35043d9d
-
SHA256
fb9e9215deca3e197ebc03f3e84fd2c02fed5cb14ae31c5693dfd7a8727b9443
-
SHA512
98150df7b086e75052a33b02cd497e5aa54243c9a86af4eb5c23ee8f70937e673ddbd94f39ae91df8ab688fc437e982b0ef0a912c56fec6486b951f7241ede2b
-
SSDEEP
12288:iRP2B0xTGlxNqvNu2hZ+nUEsn9ujSkPXjEINck2egMV4fDoR8s6f4GNZhi5yQ610:yPLaVUH999uTvck2egMHR8s6f4GNy5yW
Malware Config
Extracted
formbook
4.1
ae30
lili116.ru
apatitum.ru
broadbandterbaik.com
flrfteb.ru
xysklhgf.xyz
thevelvetkit.africa
zwelethugh.africa
imassageandstretchdance.com
laser3dstudio.com
efefplantation.buzz
cyberwisely.com
hulihuli.net
electrosertecnologia.com
golanglearn.club
cee4agency.com
bedicustomgraphicapparel.com
aim2fitness.com
greenarrow-advisors.com
lotadan.com
kgaming.dev
alphaestetica.com
ailihuq.com
christmaslv.com
grandviewtub2shower.com
gbera9ja.africa
falconspice.com
ladderlab.site
dollarvalue-guide.site
frametasticuy.com
lowridericon.com
fshxzz.com
awath.dev
drinkcircleback.com
lostdrivinglicence.co.uk
kick-shoes.com
accidentattorneysearch-jp.life
asteramoving.com
dompacino.com
k59963.com
bayadere.co.uk
jkdairyjammu.com
ifidesignedit.com
ezengage.com
board-advising.com
reachphone.app
lajwbwcl.com
landscapingideas.site
diamondshouse-hannover.online
dustinoliver.com
fierceroar.uk
4983517.com
inhomeidea.com
firstchoicecladding.co.uk
kurrent.store
bcerviews.org.uk
guideonwheels.com
fact-times.live
bakedcivilization.com
howlsmovingcastlemerch.store
kinder-vaccine.com
landonwieweck.com
dxbsultan.com
tutastrading.africa
rseriali.net
lobosmc12.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/1888-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1888-189-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1888-195-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4844-197-0x00000000001A0000-0x00000000001CF000-memory.dmp formbook behavioral2/memory/4844-199-0x00000000001A0000-0x00000000001CF000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Quotation-pdf-.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2300 set thread context of 1888 2300 Quotation-pdf-.exe 95 PID 1888 set thread context of 3128 1888 Quotation-pdf-.exe 34 PID 1888 set thread context of 3128 1888 Quotation-pdf-.exe 34 PID 4844 set thread context of 3128 4844 ipconfig.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1948 schtasks.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4844 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4972 powershell.exe 1888 Quotation-pdf-.exe 1888 Quotation-pdf-.exe 1888 Quotation-pdf-.exe 1888 Quotation-pdf-.exe 4972 powershell.exe 1888 Quotation-pdf-.exe 1888 Quotation-pdf-.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3128 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1888 Quotation-pdf-.exe 1888 Quotation-pdf-.exe 1888 Quotation-pdf-.exe 1888 Quotation-pdf-.exe 4844 ipconfig.exe 4844 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 1888 Quotation-pdf-.exe Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeDebugPrivilege 4844 ipconfig.exe Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2300 wrote to memory of 4972 2300 Quotation-pdf-.exe 91 PID 2300 wrote to memory of 4972 2300 Quotation-pdf-.exe 91 PID 2300 wrote to memory of 4972 2300 Quotation-pdf-.exe 91 PID 2300 wrote to memory of 1948 2300 Quotation-pdf-.exe 93 PID 2300 wrote to memory of 1948 2300 Quotation-pdf-.exe 93 PID 2300 wrote to memory of 1948 2300 Quotation-pdf-.exe 93 PID 2300 wrote to memory of 1888 2300 Quotation-pdf-.exe 95 PID 2300 wrote to memory of 1888 2300 Quotation-pdf-.exe 95 PID 2300 wrote to memory of 1888 2300 Quotation-pdf-.exe 95 PID 2300 wrote to memory of 1888 2300 Quotation-pdf-.exe 95 PID 2300 wrote to memory of 1888 2300 Quotation-pdf-.exe 95 PID 2300 wrote to memory of 1888 2300 Quotation-pdf-.exe 95 PID 3128 wrote to memory of 4844 3128 Explorer.EXE 97 PID 3128 wrote to memory of 4844 3128 Explorer.EXE 97 PID 3128 wrote to memory of 4844 3128 Explorer.EXE 97 PID 4844 wrote to memory of 964 4844 ipconfig.exe 98 PID 4844 wrote to memory of 964 4844 ipconfig.exe 98 PID 4844 wrote to memory of 964 4844 ipconfig.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\Quotation-pdf-.exe"C:\Users\Admin\AppData\Local\Temp\Quotation-pdf-.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yYGjXdLxDvmJNE.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yYGjXdLxDvmJNE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3950.tmp"3⤵
- Creates scheduled task(s)
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation-pdf-.exe"C:\Users\Admin\AppData\Local\Temp\Quotation-pdf-.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2864
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation-pdf-.exe"3⤵PID:964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5f7bb40f072afc7bb0f9c231f9947ce41
SHA131eeb28b98f2ad5526df94d5eb6cfbc7517694d7
SHA256984537c3aa6b1aa0a6d8f172a485af7918f133d595671c743031c2acc02861f4
SHA512b4b8160b35f40cbe2c9a4e6a8f09905ea22b8c3378a62d7ab5ad2026cace69b9e3bf7790b54529b05522804b921ca716ffdfeaaf47586fd4ac55b76641f2d239