Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 17:40
Static task
static1
Behavioral task
behavioral1
Sample
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe
Resource
win7-20230712-en
General
-
Target
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe
-
Size
806KB
-
MD5
5f41a9b656d58e1490e0689dfcbac025
-
SHA1
4f604324498d3b23c410f50cb20f4c7d0077115d
-
SHA256
b289fe67b0185e1ba0177f583675ce399772bf03fd813d47835c45427f71fbf0
-
SHA512
4246060c3885ce954b70252f68d7bd293672940c75a2a3a2fed7179320256239bd2bda1daaf89ecaf8b54be89f211ce799acd41d6fd2481c2e2e6a1b3fdc5e4a
-
SSDEEP
24576:Kik1oB0qnJjJuNXMJSCLAN548K7r26mgTlZ3:KikaBj7JYN548e26mi
Malware Config
Extracted
formbook
4.1
jr22
941zhe.com
lunarportal.space
xn--osmaniyeiek-t9ab.online
trejoscar.com
nrnursery.com
quizcannot.cfd
seedstockersthailand.com
watsonwindow.com
wjfholdings.com
weziclondon.com
naruot.xyz
yeji.plus
classicmenstore.com
oharatravel.com
therapyplankits.com
keviegreshonpt.com
qdlyner.com
seithupaarungal.com
casinorates.online
8ug4as.icu
foamyfallscarwash.com
padelfaculty.com
theenergysavingcentre.com
dorpp.com
scoresendirect.online
yuqintw.com
erenortopedi.com
skymagickey.com
infinitepuremind.com
watchtamilmovie.com
southplainsinsurance.net
intentionaldating.app
certaproarkansas.com
blidai.com
thehoneybeeworks.com
followplace.com
sipsterbyananeke.com
37300.uk
bluebirdbuyers.com
composewithme.com
moneymundo.com
daftarakun.xyz
samsonm.com
nurse-jobs-in-us-35896.com
cancerbloodspecialistsga.net
feelfeminineagain.com
residentialcaretraining.com
allprocleanouts.com
englishsongs.online
bookkeepingdeerfield.com
bendcollegeadvisor.com
boaiqixian.com
vixensgolfcarts.com
igarrido.net
rsconstructiontrading.com
lakewayturf.com
carelesstees.com
silviaheni.xyz
iaqieqq.com
campingspiel.com
diacute.com
thaigeneratortg.com
autoreenter.com
meclishaber.xyz
airbnbtransfers.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3820-157-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3820-165-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3492-190-0x0000000000190000-0x00000000001BF000-memory.dmp formbook behavioral2/memory/3492-198-0x0000000000190000-0x00000000001BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exeOrdem de compra confirmada OC 215 Nortaluga Lda 08082023.execmmon32.exedescription pid process target process PID 4196 set thread context of 3820 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 3820 set thread context of 3092 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Explorer.EXE PID 3492 set thread context of 3092 3492 cmmon32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exepowershell.exepowershell.exeOrdem de compra confirmada OC 215 Nortaluga Lda 08082023.execmmon32.exepid process 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 2296 powershell.exe 5000 powershell.exe 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 3492 cmmon32.exe 3492 cmmon32.exe 2296 powershell.exe 5000 powershell.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe 3492 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3092 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.execmmon32.exepid process 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe 3492 cmmon32.exe 3492 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powershell.exepowershell.exeOrdem de compra confirmada OC 215 Nortaluga Lda 08082023.exeOrdem de compra confirmada OC 215 Nortaluga Lda 08082023.execmmon32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 5000 powershell.exe Token: SeDebugPrivilege 2296 powershell.exe Token: SeDebugPrivilege 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Token: SeDebugPrivilege 3820 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Token: SeDebugPrivilege 3492 cmmon32.exe Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE Token: SeShutdownPrivilege 3092 Explorer.EXE Token: SeCreatePagefilePrivilege 3092 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exeExplorer.EXEcmmon32.exedescription pid process target process PID 4196 wrote to memory of 2296 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 4196 wrote to memory of 2296 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 4196 wrote to memory of 2296 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 4196 wrote to memory of 5000 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 4196 wrote to memory of 5000 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 4196 wrote to memory of 5000 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe powershell.exe PID 4196 wrote to memory of 4564 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe schtasks.exe PID 4196 wrote to memory of 4564 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe schtasks.exe PID 4196 wrote to memory of 4564 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe schtasks.exe PID 4196 wrote to memory of 2828 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 2828 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 2828 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 3820 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 3820 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 3820 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 3820 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 3820 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 4196 wrote to memory of 3820 4196 Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe PID 3092 wrote to memory of 3492 3092 Explorer.EXE cmmon32.exe PID 3092 wrote to memory of 3492 3092 Explorer.EXE cmmon32.exe PID 3092 wrote to memory of 3492 3092 Explorer.EXE cmmon32.exe PID 3492 wrote to memory of 3832 3492 cmmon32.exe cmd.exe PID 3492 wrote to memory of 3832 3492 cmmon32.exe cmd.exe PID 3492 wrote to memory of 3832 3492 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lbAVIbuklDrX.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lbAVIbuklDrX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFD47.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ordem de compra confirmada OC 215 Nortaluga Lda 08082023.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dholp4dv.fyn.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmpFD47.tmpFilesize
1KB
MD5dca51d1054c53aae044d890e0e42a82e
SHA14a02f1e7879755cd63d1f4cf9f709f72ec8e6dfa
SHA25657e94c9aad343a0849feed9f75269e92e77f8b9fe396f8a2e760dad43dff9c36
SHA5120ad2f9d9cf708125ed32b07df215349f1a662d96b8572b30d4597f9ed537b216072f1866ae2e4cbfea774a5244dcc1fac04db82d1b4b25200ae78868653daf3b
-
memory/2296-228-0x0000000007C40000-0x0000000007C4A000-memory.dmpFilesize
40KB
-
memory/2296-186-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/2296-191-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/2296-236-0x000000007EE90000-0x000000007EEA0000-memory.dmpFilesize
64KB
-
memory/2296-187-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/2296-232-0x0000000007E40000-0x0000000007ED6000-memory.dmpFilesize
600KB
-
memory/2296-231-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/2296-147-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/2296-148-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/2296-149-0x0000000002F70000-0x0000000002FA6000-memory.dmpFilesize
216KB
-
memory/2296-152-0x0000000005BC0000-0x00000000061E8000-memory.dmpFilesize
6.2MB
-
memory/2296-226-0x00000000081F0000-0x000000000886A000-memory.dmpFilesize
6.5MB
-
memory/2296-196-0x0000000006820000-0x000000000683E000-memory.dmpFilesize
120KB
-
memory/2296-240-0x0000000007F10000-0x0000000007F2A000-memory.dmpFilesize
104KB
-
memory/2296-161-0x00000000059D0000-0x0000000005A36000-memory.dmpFilesize
408KB
-
memory/2296-224-0x0000000006E50000-0x0000000006E6E000-memory.dmpFilesize
120KB
-
memory/2296-206-0x0000000071530000-0x000000007157C000-memory.dmpFilesize
304KB
-
memory/2296-160-0x0000000005960000-0x00000000059C6000-memory.dmpFilesize
408KB
-
memory/2296-241-0x0000000007EF0000-0x0000000007EF8000-memory.dmpFilesize
32KB
-
memory/2296-203-0x000000007EE90000-0x000000007EEA0000-memory.dmpFilesize
64KB
-
memory/2296-204-0x0000000006E70000-0x0000000006EA2000-memory.dmpFilesize
200KB
-
memory/2296-199-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/2296-244-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/3092-167-0x0000000002C30000-0x0000000002D2A000-memory.dmpFilesize
1000KB
-
memory/3092-197-0x0000000002C30000-0x0000000002D2A000-memory.dmpFilesize
1000KB
-
memory/3092-230-0x0000000002910000-0x00000000029BA000-memory.dmpFilesize
680KB
-
memory/3092-234-0x0000000002910000-0x00000000029BA000-memory.dmpFilesize
680KB
-
memory/3092-239-0x0000000002910000-0x00000000029BA000-memory.dmpFilesize
680KB
-
memory/3492-190-0x0000000000190000-0x00000000001BF000-memory.dmpFilesize
188KB
-
memory/3492-195-0x00000000022C0000-0x000000000260A000-memory.dmpFilesize
3.3MB
-
memory/3492-189-0x00000000007B0000-0x00000000007BC000-memory.dmpFilesize
48KB
-
memory/3492-229-0x00000000021E0000-0x0000000002273000-memory.dmpFilesize
588KB
-
memory/3492-198-0x0000000000190000-0x00000000001BF000-memory.dmpFilesize
188KB
-
memory/3492-188-0x00000000007B0000-0x00000000007BC000-memory.dmpFilesize
48KB
-
memory/3820-157-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3820-162-0x0000000001990000-0x0000000001CDA000-memory.dmpFilesize
3.3MB
-
memory/3820-166-0x0000000001420000-0x0000000001434000-memory.dmpFilesize
80KB
-
memory/3820-165-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4196-137-0x00000000006F0000-0x00000000007C0000-memory.dmpFilesize
832KB
-
memory/4196-138-0x00000000056C0000-0x0000000005C64000-memory.dmpFilesize
5.6MB
-
memory/4196-163-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/4196-144-0x0000000005400000-0x0000000005410000-memory.dmpFilesize
64KB
-
memory/4196-139-0x00000000051B0000-0x0000000005242000-memory.dmpFilesize
584KB
-
memory/4196-140-0x0000000005400000-0x0000000005410000-memory.dmpFilesize
64KB
-
memory/4196-141-0x0000000005190000-0x000000000519A000-memory.dmpFilesize
40KB
-
memory/4196-136-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/4196-142-0x0000000005410000-0x00000000054AC000-memory.dmpFilesize
624KB
-
memory/4196-143-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/5000-202-0x000000007FA20000-0x000000007FA30000-memory.dmpFilesize
64KB
-
memory/5000-235-0x000000007FA20000-0x000000007FA30000-memory.dmpFilesize
64KB
-
memory/5000-154-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/5000-155-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/5000-227-0x0000000006AC0000-0x0000000006ADA000-memory.dmpFilesize
104KB
-
memory/5000-233-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/5000-153-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/5000-192-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB
-
memory/5000-159-0x00000000054B0000-0x00000000054D2000-memory.dmpFilesize
136KB
-
memory/5000-238-0x0000000007940000-0x000000000794E000-memory.dmpFilesize
56KB
-
memory/5000-205-0x0000000071530000-0x000000007157C000-memory.dmpFilesize
304KB
-
memory/5000-194-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/5000-200-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/5000-193-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/5000-245-0x0000000075040000-0x00000000757F0000-memory.dmpFilesize
7.7MB