Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 12:27
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20230712-en
General
-
Target
invoice.exe
-
Size
926KB
-
MD5
f93b86ab785cc1422188c476d3483ad5
-
SHA1
cb8e9cedad42afbf0a32cdc58643450fd149e6ad
-
SHA256
6217071ee755bb3de9914c5ee71161ed5666acd77c7cb6bd972d465707bf0613
-
SHA512
b7161e145dcf2ab24816866980f8afb42f0535e75a66c870c86f043140580203d94bd754ee35a52f2dc6722d282fdf48aa6f87b85ec7d97c8a6b80efc3258c63
-
SSDEEP
12288:D1PDogOtA1MUII0a6PCKv3rBtOpxP2eZrW2uvMrxJ8mJAsjFmR00lqTjgidAA:STUIIN6PCKCpxDrFyOxJ8aAwAgTjjA
Malware Config
Extracted
formbook
4.1
e14e
bekamwanitajogja.com
dysae21.xyz
warehouse-top-jobs.today
h53h.com
fertility.builders
coincallpro.com
gdlinternational.sale
r3hews.shop
sg199.com
whitehillmemorials.com
nadadedor.com
pamphletbox.com
4dsmartglass.com
avaluxuryliving.com
fatdog.club
insightinvention.com
exmigraine.com
bridxo.xyz
wy6zbsa.xyz
jithinvijay.com
chequeaste.com
import-car-support.link
acre-int-com.com
nakamastreetwear.com
yubangsanbao.com
lwion.com
croc-tarts.com
seniors.properties
mailerbs.com
homebaristanz.store
ky888q.net
codelearnacademy.com
notary-gold.com
usanews77.com
thebridgeacupuncture.com
falaparispodcast.com
promptize.xyz
noobcampers.com
promo121.com
laconicapps.com
xn--bespinprocuralcaiz-20b.com
healthgoodtime.com
6077760.com
www-okontorcu.online
phoenixplm.com
fero.store
ourfransuccess.com
zfgj14.art
lottoball.work
avilabind.com
denebcreativellc.com
eazylivin.store
x4uup.cfd
patrick-frank.com
ss9828c.sbs
tiffin-express.com
the38thhouseontheleft.com
onlookshoot.site
ioooppk.com
statenislanddisability.com
fanuelirnaldi.com
mayqpaqswit.info
choosearrive.com
waggingwords.com
1120hjl.top
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/708-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/708-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4808-152-0x00000000003A0000-0x00000000003CF000-memory.dmp formbook behavioral2/memory/4808-168-0x00000000003A0000-0x00000000003CF000-memory.dmp formbook behavioral2/memory/4808-184-0x00000000003A0000-0x00000000003CF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4432 set thread context of 708 4432 invoice.exe 90 PID 708 set thread context of 2620 708 invoice.exe 19 PID 4808 set thread context of 2620 4808 cmmon32.exe 19 -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 708 invoice.exe 708 invoice.exe 708 invoice.exe 708 invoice.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe 4808 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 708 invoice.exe 708 invoice.exe 708 invoice.exe 4808 cmmon32.exe 4808 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 708 invoice.exe Token: SeDebugPrivilege 4808 cmmon32.exe Token: SeShutdownPrivilege 2620 Explorer.EXE Token: SeCreatePagefilePrivilege 2620 Explorer.EXE Token: SeShutdownPrivilege 2620 Explorer.EXE Token: SeCreatePagefilePrivilege 2620 Explorer.EXE Token: SeShutdownPrivilege 2620 Explorer.EXE Token: SeCreatePagefilePrivilege 2620 Explorer.EXE Token: SeShutdownPrivilege 2620 Explorer.EXE Token: SeCreatePagefilePrivilege 2620 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4432 wrote to memory of 708 4432 invoice.exe 90 PID 4432 wrote to memory of 708 4432 invoice.exe 90 PID 4432 wrote to memory of 708 4432 invoice.exe 90 PID 4432 wrote to memory of 708 4432 invoice.exe 90 PID 4432 wrote to memory of 708 4432 invoice.exe 90 PID 4432 wrote to memory of 708 4432 invoice.exe 90 PID 2620 wrote to memory of 4808 2620 Explorer.EXE 91 PID 2620 wrote to memory of 4808 2620 Explorer.EXE 91 PID 2620 wrote to memory of 4808 2620 Explorer.EXE 91 PID 4808 wrote to memory of 3600 4808 cmmon32.exe 92 PID 4808 wrote to memory of 3600 4808 cmmon32.exe 92 PID 4808 wrote to memory of 3600 4808 cmmon32.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:708
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\invoice.exe"3⤵PID:3600
-
-