Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-20230712-en
General
-
Target
INVOICE.exe
-
Size
237KB
-
MD5
0ee858a143b831660ad55a2fbf13a6e1
-
SHA1
f378acacb7da3fe89f0bb0df43776797084313cf
-
SHA256
cd56edf9ac230205c76045c5fabbbf68b28b011e066721e4f2b95653dc22a34c
-
SHA512
20a4385d61c6826299b9ff3e61b101a9a57d446c967f478458369d39d6d95e3ce23a0e595f46fe68470a972869104f91c7f3f69ac9248c6dac3f05a776fa80f3
-
SSDEEP
6144:vYa618FO4xhOTAuavp5J9t/rswGImsj+O6zFhfOB6myN9d/HnpEryOd:vYP8FzMT87J9N1ZB6JgcdN9d+rFd
Malware Config
Extracted
formbook
4.1
ds19
pribit-92.com
wrist-couture.com
alanka.company
uffitgvr.click
bwtsatotravel.com
anpmarketinginc.com
startupsvibes.com
shearabia.com
sayemail5.store
solsticeinstitute.com
perfectholidaydeals.com
xfitness.life
mmbs-ad.com
jacodile.com
hjpolastudio.com
healuu.com
agtwer.homes
installationschampions.info
bettys70th.com
sustainable-re.com
x23171.vip
relationalsolutionstherapy.com
yyds1449.icu
grizzlycolombia.com
digitalreceivables.com
9acv.com
bagelhousecol.com
bigbargainblog.com
international-business.online
lancasar.com
erasmustudy.com
blohdx.online
oatleaves.online
peakperformance-logistics.com
badhatrecords.com
rosyxox.com
rtpgacor500x.live
linkpixel.xyz
7y2ew.store
sexmovies-top.com
ofile.live
hellotest679.com
best-patioawnings.services
theinstallationchampion.com
willwintrading.com
btdjpuif.click
corriere24notizie.com
yvowveio.click
ofildubienetre.com
ma5z3ze9.site
sirvanaspirit.com
gamblezen.biz
sambhabmishra.com
bloodhound-tracker.net
artsyblevs.com
rimalelectrical.com
martekkereste.com
wxrdtmxr.click
formula1413.click
adecadetomelvin.com
brogetti.com
hippohoodie.com
6868msc.com
viniciusenatalia.com
jepe-olympus.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2124-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2124-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/220-16-0x0000000000A00000-0x0000000000A2F000-memory.dmp formbook behavioral2/memory/220-18-0x0000000000A00000-0x0000000000A2F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2440 INVOICE.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2440 set thread context of 2124 2440 INVOICE.exe 82 PID 2124 set thread context of 3180 2124 INVOICE.exe 35 PID 220 set thread context of 3180 220 cmmon32.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2124 INVOICE.exe 2124 INVOICE.exe 2124 INVOICE.exe 2124 INVOICE.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe 220 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3180 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2440 INVOICE.exe 2124 INVOICE.exe 2124 INVOICE.exe 2124 INVOICE.exe 220 cmmon32.exe 220 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2124 INVOICE.exe Token: SeDebugPrivilege 220 cmmon32.exe Token: SeShutdownPrivilege 3180 Explorer.EXE Token: SeCreatePagefilePrivilege 3180 Explorer.EXE Token: SeShutdownPrivilege 3180 Explorer.EXE Token: SeCreatePagefilePrivilege 3180 Explorer.EXE Token: SeShutdownPrivilege 3180 Explorer.EXE Token: SeCreatePagefilePrivilege 3180 Explorer.EXE Token: SeShutdownPrivilege 3180 Explorer.EXE Token: SeCreatePagefilePrivilege 3180 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2124 2440 INVOICE.exe 82 PID 2440 wrote to memory of 2124 2440 INVOICE.exe 82 PID 2440 wrote to memory of 2124 2440 INVOICE.exe 82 PID 2440 wrote to memory of 2124 2440 INVOICE.exe 82 PID 3180 wrote to memory of 220 3180 Explorer.EXE 83 PID 3180 wrote to memory of 220 3180 Explorer.EXE 83 PID 3180 wrote to memory of 220 3180 Explorer.EXE 83 PID 220 wrote to memory of 4920 220 cmmon32.exe 88 PID 220 wrote to memory of 4920 220 cmmon32.exe 88 PID 220 wrote to memory of 4920 220 cmmon32.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"3⤵PID:4920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD569455b1cf51ca23385cd850a46eefefb
SHA154a87eaa1be72a12a276ae60aa456e088057f0fb
SHA256613dd7289f5cc9f53a850b7de98eebff647d85ecebf3e71e55c7e4cc1a4efc80
SHA5122732beafc9c1a35f38f99fa672845e741855fe18a54b9487404c7b3bafa1151b7d5dbfad28ab3158a2035bf3ff381a93bc450e9991a56b5b9ab443b93fbaca6b