Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
Product Specifications xlsx.exe
Resource
win7-20230824-en
General
-
Target
Product Specifications xlsx.exe
-
Size
254KB
-
MD5
ac43233dd5fe6d55c112660dc700e564
-
SHA1
2f431f411c707593f2f4bd67da5db2e9a9593778
-
SHA256
d93182b7b2c8633aa7f379efdc80aa778ecc0b59a01929bb10a02cd8349354d2
-
SHA512
a3fd81e3d3e4e7271ef1536e8f0c10c945780a916e168bd19bd67e03dd2a326b5910bf528220aa24ccd8799e02b50fbc30e953b3cde2c3d8a2c0dffd0278c770
-
SSDEEP
6144:/Ya6lEiLxFG1cz5mqDoGPuduieEJE827qVkF28m4znusYtq4yC:/Y3EUxFzz57Dooudu9A5ko4zusYtFyC
Malware Config
Extracted
formbook
4.1
sn26
resenha10.bet
gulshan-rajput.com
xbus.tech
z813my.cfd
wlxzjlny.cfd
auntengotiempo.com
canada-reservation.com
thegiftcompany.shop
esthersilveirapropiedades.com
1wapws.top
ymjblnvo.cfd
termokimik.net
kushiro-artist-school.com
bmmboo.com
caceresconstructionservices.com
kentuckywalkabout.com
bringyourcart.com
miamiwinetour.com
bobcatsocial.site
thirdmind.network
4tbbwa.com
rhinosecurellc.net
rdparadise.com
radpm.xyz
thewhiteorchidspa.com
clhynfco.cfd
ngohcvja.cfd
woodennickelcandles.com
gg18rb.cfd
qcdrxwr.cfd
974dp.com
lagardere-vivendi-corp.net
chestnutmaretraining.com
seosjekk.online
ahevrlh.xyz
uedam.xyz
natrada.love
yoywvfw.top
unifiedtradingjapan.com
chinakaldi.com
agenciacolmeiadigital.com
wdlzzfkc.cfd
097850.com
xingcansy.com
uahrbqtj.cfd
charliehaywood.com
witheres.shop
sqiyvdrx.cfd
biopfizer.com
tiktokviewer.com
prftwgmw.cfd
sfsdnwpf.cfd
linkboladewahub.xyz
orvados.com
goodshepherdopcesva.com
christianlovewv.com
cdicontrols.com
hawskio26.click
ownlegalhelp.com
tiydmdzp.cfd
ppirr.biz
stonyatrick.com
itsamazingbarley.com
msjbaddf.cfd
zachmahl.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2644-8-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2644-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2644-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2936-24-0x00000000000B0000-0x00000000000DF000-memory.dmp formbook behavioral1/memory/2936-26-0x00000000000B0000-0x00000000000DF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 Product Specifications xlsx.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2060 set thread context of 2644 2060 Product Specifications xlsx.exe 29 PID 2644 set thread context of 1268 2644 Product Specifications xlsx.exe 13 PID 2644 set thread context of 1268 2644 Product Specifications xlsx.exe 13 PID 2936 set thread context of 1268 2936 wininit.exe 13 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2644 Product Specifications xlsx.exe 2644 Product Specifications xlsx.exe 2644 Product Specifications xlsx.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe 2936 wininit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2060 Product Specifications xlsx.exe 2644 Product Specifications xlsx.exe 2644 Product Specifications xlsx.exe 2644 Product Specifications xlsx.exe 2644 Product Specifications xlsx.exe 2936 wininit.exe 2936 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 Product Specifications xlsx.exe Token: SeDebugPrivilege 2936 wininit.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2644 2060 Product Specifications xlsx.exe 29 PID 2060 wrote to memory of 2644 2060 Product Specifications xlsx.exe 29 PID 2060 wrote to memory of 2644 2060 Product Specifications xlsx.exe 29 PID 2060 wrote to memory of 2644 2060 Product Specifications xlsx.exe 29 PID 2060 wrote to memory of 2644 2060 Product Specifications xlsx.exe 29 PID 1268 wrote to memory of 2936 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2936 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2936 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2936 1268 Explorer.EXE 30 PID 2936 wrote to memory of 2592 2936 wininit.exe 31 PID 2936 wrote to memory of 2592 2936 wininit.exe 31 PID 2936 wrote to memory of 2592 2936 wininit.exe 31 PID 2936 wrote to memory of 2592 2936 wininit.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"3⤵
- Deletes itself
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5588cb1a8e7a30760b06e0d17e1d530da
SHA181c3b8ad80b3eab1cca85efaba50cc06f4fea922
SHA2560e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c
SHA512bb3e2bd8a7f9ee3693c5d777352eff23c2c4aaf61adf8954166f6b05d163307c55a33ae06d423c569485b92e51336c09db62c2393d131ab40b1f21663dc89644
-
Filesize
46KB
MD5588cb1a8e7a30760b06e0d17e1d530da
SHA181c3b8ad80b3eab1cca85efaba50cc06f4fea922
SHA2560e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c
SHA512bb3e2bd8a7f9ee3693c5d777352eff23c2c4aaf61adf8954166f6b05d163307c55a33ae06d423c569485b92e51336c09db62c2393d131ab40b1f21663dc89644