Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
09-08-2023 17:40
Static task
static1
Behavioral task
behavioral1
Sample
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe
Resource
win7-20230712-en
General
-
Target
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe
-
Size
806KB
-
MD5
5f41a9b656d58e1490e0689dfcbac025
-
SHA1
4f604324498d3b23c410f50cb20f4c7d0077115d
-
SHA256
b289fe67b0185e1ba0177f583675ce399772bf03fd813d47835c45427f71fbf0
-
SHA512
4246060c3885ce954b70252f68d7bd293672940c75a2a3a2fed7179320256239bd2bda1daaf89ecaf8b54be89f211ce799acd41d6fd2481c2e2e6a1b3fdc5e4a
-
SSDEEP
24576:Kik1oB0qnJjJuNXMJSCLAN548K7r26mgTlZ3:KikaBj7JYN548e26mi
Malware Config
Extracted
formbook
4.1
jr22
941zhe.com
lunarportal.space
xn--osmaniyeiek-t9ab.online
trejoscar.com
nrnursery.com
quizcannot.cfd
seedstockersthailand.com
watsonwindow.com
wjfholdings.com
weziclondon.com
naruot.xyz
yeji.plus
classicmenstore.com
oharatravel.com
therapyplankits.com
keviegreshonpt.com
qdlyner.com
seithupaarungal.com
casinorates.online
8ug4as.icu
foamyfallscarwash.com
padelfaculty.com
theenergysavingcentre.com
dorpp.com
scoresendirect.online
yuqintw.com
erenortopedi.com
skymagickey.com
infinitepuremind.com
watchtamilmovie.com
southplainsinsurance.net
intentionaldating.app
certaproarkansas.com
blidai.com
thehoneybeeworks.com
followplace.com
sipsterbyananeke.com
37300.uk
bluebirdbuyers.com
composewithme.com
moneymundo.com
daftarakun.xyz
samsonm.com
nurse-jobs-in-us-35896.com
cancerbloodspecialistsga.net
feelfeminineagain.com
residentialcaretraining.com
allprocleanouts.com
englishsongs.online
bookkeepingdeerfield.com
bendcollegeadvisor.com
boaiqixian.com
vixensgolfcarts.com
igarrido.net
rsconstructiontrading.com
lakewayturf.com
carelesstees.com
silviaheni.xyz
iaqieqq.com
campingspiel.com
diacute.com
thaigeneratortg.com
autoreenter.com
meclishaber.xyz
airbnbtransfers.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2964-80-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2964-92-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2784-100-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/2784-102-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2692 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exeOrdem de compra confirmada OC 215 Nortaluga Lda 08082023.execontrol.exedescription pid process target process PID 2616 set thread context of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 2964 set thread context of 1400 2964 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Explorer.EXE PID 2784 set thread context of 1400 2784 control.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
powershell.exepowershell.exeOrdem de compra confirmada OC 215 Nortaluga Lda 08082023.execontrol.exepid process 324 powershell.exe 2172 powershell.exe 2964 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 2964 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1400 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.execontrol.exepid process 2964 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 2964 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 2964 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 2784 control.exe 2784 control.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exeOrdem de compra confirmada OC 215 Nortaluga Lda 08082023.execontrol.exedescription pid process Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2964 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Token: SeDebugPrivilege 2784 control.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exeExplorer.EXEcontrol.exedescription pid process target process PID 2616 wrote to memory of 2172 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 2172 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 2172 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 2172 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 324 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 324 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 324 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 324 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 2616 wrote to memory of 2332 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe schtasks.exe PID 2616 wrote to memory of 2332 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe schtasks.exe PID 2616 wrote to memory of 2332 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe schtasks.exe PID 2616 wrote to memory of 2332 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe schtasks.exe PID 2616 wrote to memory of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 2616 wrote to memory of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 2616 wrote to memory of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 2616 wrote to memory of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 2616 wrote to memory of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 2616 wrote to memory of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 2616 wrote to memory of 2964 2616 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 1400 wrote to memory of 2784 1400 Explorer.EXE control.exe PID 1400 wrote to memory of 2784 1400 Explorer.EXE control.exe PID 1400 wrote to memory of 2784 1400 Explorer.EXE control.exe PID 1400 wrote to memory of 2784 1400 Explorer.EXE control.exe PID 2784 wrote to memory of 2692 2784 control.exe cmd.exe PID 2784 wrote to memory of 2692 2784 control.exe cmd.exe PID 2784 wrote to memory of 2692 2784 control.exe cmd.exe PID 2784 wrote to memory of 2692 2784 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lbAVIbuklDrX.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lbAVIbuklDrX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7B77.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp7B77.tmpFilesize
1KB
MD558d9dba5a9f418fede26ae55c8e7b30c
SHA1bd0481d6a9ce0c2ae028591f3cd1fab915a41498
SHA256aebd4920a7fd27b01267468298e27dcae0f34d98353f46e2294906e50ead2e01
SHA512148b733ec0134ca5c20e61e1eb72844eee27adaf553d7cf0b6fa4e0e3af07eed5b4b60fa83d51bc4e1b16b9394447dac128ccfd30c0ec9103464d3df0611f8b9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z0P7C7U8E5RH5XL93IKZ.tempFilesize
7KB
MD5365c719831004ca99e791a83833ec420
SHA162e04cc31b09b0209e247d3e88225bedebab0303
SHA2562c5e4728e7ef3dda51f54d78e0cf914ac9f3e1b96a448e99916613e0ad45189d
SHA51219033b8f4d2b7dc4a14ebd9233be7126f668eca6aebd4c6adb43626c44bd01a79f4b191b49b49786eaa8e3875ed8ed73d06981c4c6e63a87aade08b4ccf8eef9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5365c719831004ca99e791a83833ec420
SHA162e04cc31b09b0209e247d3e88225bedebab0303
SHA2562c5e4728e7ef3dda51f54d78e0cf914ac9f3e1b96a448e99916613e0ad45189d
SHA51219033b8f4d2b7dc4a14ebd9233be7126f668eca6aebd4c6adb43626c44bd01a79f4b191b49b49786eaa8e3875ed8ed73d06981c4c6e63a87aade08b4ccf8eef9
-
memory/324-97-0x000000006F290000-0x000000006F83B000-memory.dmpFilesize
5.7MB
-
memory/324-87-0x0000000001E60000-0x0000000001EA0000-memory.dmpFilesize
256KB
-
memory/324-85-0x000000006F290000-0x000000006F83B000-memory.dmpFilesize
5.7MB
-
memory/324-83-0x0000000001E60000-0x0000000001EA0000-memory.dmpFilesize
256KB
-
memory/324-82-0x000000006F290000-0x000000006F83B000-memory.dmpFilesize
5.7MB
-
memory/1400-95-0x00000000069D0000-0x0000000006AD4000-memory.dmpFilesize
1.0MB
-
memory/1400-108-0x0000000006DF0000-0x0000000006F38000-memory.dmpFilesize
1.3MB
-
memory/1400-106-0x0000000006DF0000-0x0000000006F38000-memory.dmpFilesize
1.3MB
-
memory/1400-105-0x0000000006DF0000-0x0000000006F38000-memory.dmpFilesize
1.3MB
-
memory/2172-84-0x0000000002460000-0x00000000024A0000-memory.dmpFilesize
256KB
-
memory/2172-96-0x000000006F290000-0x000000006F83B000-memory.dmpFilesize
5.7MB
-
memory/2172-89-0x000000006F290000-0x000000006F83B000-memory.dmpFilesize
5.7MB
-
memory/2172-88-0x0000000002460000-0x00000000024A0000-memory.dmpFilesize
256KB
-
memory/2172-86-0x000000006F290000-0x000000006F83B000-memory.dmpFilesize
5.7MB
-
memory/2616-59-0x0000000004980000-0x00000000049C0000-memory.dmpFilesize
256KB
-
memory/2616-60-0x00000000003E0000-0x00000000003EE000-memory.dmpFilesize
56KB
-
memory/2616-57-0x00000000003B0000-0x00000000003C6000-memory.dmpFilesize
88KB
-
memory/2616-61-0x00000000058A0000-0x0000000005926000-memory.dmpFilesize
536KB
-
memory/2616-56-0x0000000004980000-0x00000000049C0000-memory.dmpFilesize
256KB
-
memory/2616-81-0x0000000074250000-0x000000007493E000-memory.dmpFilesize
6.9MB
-
memory/2616-58-0x0000000074250000-0x000000007493E000-memory.dmpFilesize
6.9MB
-
memory/2616-54-0x0000000000F80000-0x0000000001050000-memory.dmpFilesize
832KB
-
memory/2616-55-0x0000000074250000-0x000000007493E000-memory.dmpFilesize
6.9MB
-
memory/2784-102-0x00000000000C0000-0x00000000000EF000-memory.dmpFilesize
188KB
-
memory/2784-104-0x0000000001E70000-0x0000000001F03000-memory.dmpFilesize
588KB
-
memory/2784-101-0x00000000020A0000-0x00000000023A3000-memory.dmpFilesize
3.0MB
-
memory/2784-100-0x00000000000C0000-0x00000000000EF000-memory.dmpFilesize
188KB
-
memory/2784-98-0x0000000000260000-0x000000000027F000-memory.dmpFilesize
124KB
-
memory/2784-99-0x0000000000260000-0x000000000027F000-memory.dmpFilesize
124KB
-
memory/2964-80-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2964-78-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2964-93-0x00000000001C0000-0x00000000001D4000-memory.dmpFilesize
80KB
-
memory/2964-92-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2964-76-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2964-74-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2964-90-0x0000000000890000-0x0000000000B93000-memory.dmpFilesize
3.0MB