Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-07-2023 08:36
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order.exe
Resource
win7-20230712-en
General
-
Target
New Purchase Order.exe
-
Size
680KB
-
MD5
643062ea861a7196b0df63d3e4255b49
-
SHA1
3f68331238a454483ec074f496da2d86b2f62b33
-
SHA256
bdc8c2c8c2cf14b3189551124ff820c303a36139830b0ce299f2538ef9c2ff06
-
SHA512
4280de1611cee42ea7f176ec518c6b444723effc4fa1cdbd640d8833935b88f8f92aa5284f76d31a237f367d7f68727f0c4ecf84409621508befacfebd6e9b15
-
SSDEEP
12288:ZWc/bUYIsYoln7v3T4Fv9g1SCuTaei676+7r8iJcxivpckh+0xYQ71kn/U5g:MiXrYomF9gihx6Mr8i7mkhbGa2q
Malware Config
Extracted
formbook
4.1
ee2q
uspbs.top
proflidi.com
fcsawftffcoffical.buzz
rustie.link
mflol.uk
safepalercclaim.buzz
tuomamoban.com
gxkchp.live
kfpu.store
bjcxks.com
netfiix-account.info
flyonex.com
faranstechtalk.com
littlenuggetproperties.com
greatpromo.site
bricepacific.com
yourhometownappliancerepair.com
citrixsettlement.com
delivery-broccar.com
inncur.space
reallinvest.fun
tu1818.xyz
daqinp11012.club
katica.net
23382338.xyz
alicjapeszkowska.com
dpttotalsolutions.com
mobilefreekids.com
re-mytax-enquireaus.com
windstudie.com
boguslavka.com
guineeanalyseopinions.net
oliviaandelena.com
peterschwartzmanformayor.com
gendersurgerychelwest.co.uk
ry5638.com
emperor303.com
8xmac.top
tusseau.live
proactionbrandsdevelopment.com
prostadine202.store
gefa.ovh
porgy.online
iklanbarisgorontalo.com
taxigiarethainguyen.top
iitik.com
rooseveltdp.com
mygoogles.ch
btoie.space
shopazlifestylehomes.com
premsaoli.cat
ijinusaha.info
sansheng.love
sawtoothai.com
thecollinsgroupinc.com
challengecoinwraehouse.com
dailymedplus.com
tribek9fl.com
8w.gay
soundbase.life
blackgirlsbeenmagical.com
cospaz.com
czbxlk.com
remservlg.store
genosync.xyz
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2144-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2144-70-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2144-74-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2164-79-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/2164-81-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1532 set thread context of 2144 1532 New Purchase Order.exe 32 PID 2144 set thread context of 1248 2144 New Purchase Order.exe 13 PID 2144 set thread context of 1248 2144 New Purchase Order.exe 13 PID 2164 set thread context of 1248 2164 cmstp.exe 13 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1532 New Purchase Order.exe 1532 New Purchase Order.exe 2144 New Purchase Order.exe 2144 New Purchase Order.exe 2144 New Purchase Order.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe 2164 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2144 New Purchase Order.exe 2144 New Purchase Order.exe 2144 New Purchase Order.exe 2144 New Purchase Order.exe 2164 cmstp.exe 2164 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1532 New Purchase Order.exe Token: SeDebugPrivilege 2144 New Purchase Order.exe Token: SeDebugPrivilege 2164 cmstp.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1532 wrote to memory of 816 1532 New Purchase Order.exe 30 PID 1532 wrote to memory of 816 1532 New Purchase Order.exe 30 PID 1532 wrote to memory of 816 1532 New Purchase Order.exe 30 PID 1532 wrote to memory of 816 1532 New Purchase Order.exe 30 PID 1532 wrote to memory of 2668 1532 New Purchase Order.exe 31 PID 1532 wrote to memory of 2668 1532 New Purchase Order.exe 31 PID 1532 wrote to memory of 2668 1532 New Purchase Order.exe 31 PID 1532 wrote to memory of 2668 1532 New Purchase Order.exe 31 PID 1532 wrote to memory of 2144 1532 New Purchase Order.exe 32 PID 1532 wrote to memory of 2144 1532 New Purchase Order.exe 32 PID 1532 wrote to memory of 2144 1532 New Purchase Order.exe 32 PID 1532 wrote to memory of 2144 1532 New Purchase Order.exe 32 PID 1532 wrote to memory of 2144 1532 New Purchase Order.exe 32 PID 1532 wrote to memory of 2144 1532 New Purchase Order.exe 32 PID 1532 wrote to memory of 2144 1532 New Purchase Order.exe 32 PID 1248 wrote to memory of 2164 1248 Explorer.EXE 33 PID 1248 wrote to memory of 2164 1248 Explorer.EXE 33 PID 1248 wrote to memory of 2164 1248 Explorer.EXE 33 PID 1248 wrote to memory of 2164 1248 Explorer.EXE 33 PID 1248 wrote to memory of 2164 1248 Explorer.EXE 33 PID 1248 wrote to memory of 2164 1248 Explorer.EXE 33 PID 1248 wrote to memory of 2164 1248 Explorer.EXE 33 PID 2164 wrote to memory of 2924 2164 cmstp.exe 34 PID 2164 wrote to memory of 2924 2164 cmstp.exe 34 PID 2164 wrote to memory of 2924 2164 cmstp.exe 34 PID 2164 wrote to memory of 2924 2164 cmstp.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"3⤵PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"3⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New Purchase Order.exe"3⤵
- Deletes itself
PID:2924
-
-