Analysis
-
max time kernel
131s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
ORDER NO. 1361 KOTTAYAM PDF.exe
Resource
win7-20230824-en
General
-
Target
ORDER NO. 1361 KOTTAYAM PDF.exe
-
Size
253KB
-
MD5
c55db21dd3941e6e9e18326783a3adac
-
SHA1
72a4ca90b62e680de38719dac7b597d34eb36a9e
-
SHA256
03ffe862ddce5d29a530979327b5c41e8d952c0785cc02578061fe234543519f
-
SHA512
b193673f3631f96f1b7263474596d4cf001aebbd79b8f42aac78b31f2e1f84942afcab950dc59ae85195dec3fca17c00bb69001eb2cfe1dde1463aa6e198d613
-
SSDEEP
6144:/Ya6pazbC0PBu7CCinLKdAGaUMoQ1qR/3Nwk1aX2:/YjUbCaBu7CCin0Gx6Njz
Malware Config
Extracted
formbook
4.1
sn26
resenha10.bet
gulshan-rajput.com
xbus.tech
z813my.cfd
wlxzjlny.cfd
auntengotiempo.com
canada-reservation.com
thegiftcompany.shop
esthersilveirapropiedades.com
1wapws.top
ymjblnvo.cfd
termokimik.net
kushiro-artist-school.com
bmmboo.com
caceresconstructionservices.com
kentuckywalkabout.com
bringyourcart.com
miamiwinetour.com
bobcatsocial.site
thirdmind.network
4tbbwa.com
rhinosecurellc.net
rdparadise.com
radpm.xyz
thewhiteorchidspa.com
clhynfco.cfd
ngohcvja.cfd
woodennickelcandles.com
gg18rb.cfd
qcdrxwr.cfd
974dp.com
lagardere-vivendi-corp.net
chestnutmaretraining.com
seosjekk.online
ahevrlh.xyz
uedam.xyz
natrada.love
yoywvfw.top
unifiedtradingjapan.com
chinakaldi.com
agenciacolmeiadigital.com
wdlzzfkc.cfd
097850.com
xingcansy.com
uahrbqtj.cfd
charliehaywood.com
witheres.shop
sqiyvdrx.cfd
biopfizer.com
tiktokviewer.com
prftwgmw.cfd
sfsdnwpf.cfd
linkboladewahub.xyz
orvados.com
goodshepherdopcesva.com
christianlovewv.com
cdicontrols.com
hawskio26.click
ownlegalhelp.com
tiydmdzp.cfd
ppirr.biz
stonyatrick.com
itsamazingbarley.com
msjbaddf.cfd
zachmahl.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2424-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2424-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2352 ORDER NO. 1361 KOTTAYAM PDF.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2352 set thread context of 2424 2352 ORDER NO. 1361 KOTTAYAM PDF.exe 3 PID 2424 set thread context of 1360 2424 ORDER NO. 1361 KOTTAYAM PDF.exe 11 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2768 2432 WerFault.exe 2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2424 ORDER NO. 1361 KOTTAYAM PDF.exe 2424 ORDER NO. 1361 KOTTAYAM PDF.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2352 ORDER NO. 1361 KOTTAYAM PDF.exe 2424 ORDER NO. 1361 KOTTAYAM PDF.exe 2424 ORDER NO. 1361 KOTTAYAM PDF.exe 2424 ORDER NO. 1361 KOTTAYAM PDF.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2424 ORDER NO. 1361 KOTTAYAM PDF.exe Token: SeShutdownPrivilege 1360 Explorer.EXE Token: SeShutdownPrivilege 1360 Explorer.EXE Token: SeShutdownPrivilege 1360 Explorer.EXE Token: SeShutdownPrivilege 1360 Explorer.EXE Token: SeShutdownPrivilege 1360 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2424 2352 ORDER NO. 1361 KOTTAYAM PDF.exe 3 PID 2352 wrote to memory of 2424 2352 ORDER NO. 1361 KOTTAYAM PDF.exe 3 PID 2352 wrote to memory of 2424 2352 ORDER NO. 1361 KOTTAYAM PDF.exe 3 PID 2352 wrote to memory of 2424 2352 ORDER NO. 1361 KOTTAYAM PDF.exe 3 PID 2352 wrote to memory of 2424 2352 ORDER NO. 1361 KOTTAYAM PDF.exe 3 PID 1360 wrote to memory of 2432 1360 Explorer.EXE 2 PID 1360 wrote to memory of 2432 1360 Explorer.EXE 2 PID 1360 wrote to memory of 2432 1360 Explorer.EXE 2 PID 1360 wrote to memory of 2432 1360 Explorer.EXE 2 PID 1360 wrote to memory of 2432 1360 Explorer.EXE 2 PID 1360 wrote to memory of 2432 1360 Explorer.EXE 2 PID 1360 wrote to memory of 2432 1360 Explorer.EXE 2 PID 2432 wrote to memory of 2768 2432 msiexec.exe 32 PID 2432 wrote to memory of 2768 2432 msiexec.exe 32 PID 2432 wrote to memory of 2768 2432 msiexec.exe 32 PID 2432 wrote to memory of 2768 2432 msiexec.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER NO. 1361 KOTTAYAM PDF.exe"C:\Users\Admin\AppData\Local\Temp\ORDER NO. 1361 KOTTAYAM PDF.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\ORDER NO. 1361 KOTTAYAM PDF.exe"C:\Users\Admin\AppData\Local\Temp\ORDER NO. 1361 KOTTAYAM PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 2722⤵
- Program crash
PID:2768
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD54ed0397b5b968b53dfc4df6b887f44d2
SHA167651d314365d3f3b767c3c01d132bf0559fc8b2
SHA256ab65ec9d27cd7b1024d1eed8dfecac58a918e8e4c3e97206112051711beec34a
SHA512f9eccc28ae881b26a4b2b8a40c743a98d72e004ed9f62015ff0c218aa3780d50ccaeccb212c2b0fe1ee1c480badf0039d339915b83e2c9566e92b03be51d4344