Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 15:56
Static task
static1
Behavioral task
behavioral1
Sample
Request For Price and Availability_PDF____.exe
Resource
win7-20230831-en
General
-
Target
Request For Price and Availability_PDF____.exe
-
Size
554KB
-
MD5
7247c2f218df48a7bd824f33f86b1760
-
SHA1
675a63f975c572ce3c761688a8224e80bce90cd0
-
SHA256
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c
-
SHA512
4051997473e621298980c0a0e44548f3bd648c70ac79afb10e96ea995570f3754a600aec823abab285dd370b033f8913642316f0c87e7d97b210ee30582ea372
-
SSDEEP
12288:8ud04ufv0zINbr57FQ6gUNYitOrlrFpIrlO+A:Rd+f3BQ6gUGVlrgr
Malware Config
Extracted
formbook
4.1
gg62
refrigerators-pk.today
jajifi.fun
fivonworld.com
rangbangs.com
server-dell.com
jefevirtual.com
jobode.info
grindhardgarage.com
gaoxiba168.com
thekotturfund.com
taberla.com
santorinieshop.com
ajptqqex.click
johnjaen.com
innovantdev.com
mjofvsea2.com
yun0796.com
rokovoko.nexus
tuabogado.gratis
jqinnovation.online
ciayo103.click
duyguyildiz.com
amchemda.com
saleproductsp.cyou
scenestealersnyc.com
zeetaplasttech.com
gdiamonddesigns.com
theblackmanofwatsap.com
hcw5858.com
oxsvabil.click
locomotiveframeinspections.com
hpkpbqdj.click
laughhub.net
seedtutoring.com
buydomain.info
tomyhammer.com
vxometry.com
honghuomart.top
solsimst.com
rajdeep.digital
capybaraerc.live
talmeshak.com
tayloryourdata.com
aspd.info
ki70dr.xyz
ketolockegypt.com
allsystemselectricians.com
besorcio.store
babeandbeauties.com
fitstylepro.com
openbinders.com
jiipwheels.net
businessed.xyz
mexpbe.xyz
hartyandsmith.com
implantedentalprecios.today
mynt.email
logisticswarehousinghub.com
dollhousesecrets.com
pt007.vip
tundeogunnusiandco.com
iavg.store
lingbdnv.click
jiangyuze.link
schinfler.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2348-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2016-23-0x0000000000070000-0x000000000009F000-memory.dmp formbook behavioral1/memory/2016-25-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
Processes:
cscript.exeflow pid process 8 2016 cscript.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2740 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Request For Price and Availability_PDF____.exeRequest For Price and Availability_PDF____.execscript.exedescription pid process target process PID 1312 set thread context of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 2348 set thread context of 1196 2348 Request For Price and Availability_PDF____.exe Explorer.EXE PID 2016 set thread context of 1196 2016 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Request For Price and Availability_PDF____.execscript.exepid process 2348 Request For Price and Availability_PDF____.exe 2348 Request For Price and Availability_PDF____.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe 2016 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Request For Price and Availability_PDF____.execscript.exepid process 2348 Request For Price and Availability_PDF____.exe 2348 Request For Price and Availability_PDF____.exe 2348 Request For Price and Availability_PDF____.exe 2016 cscript.exe 2016 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Request For Price and Availability_PDF____.execscript.exedescription pid process Token: SeDebugPrivilege 2348 Request For Price and Availability_PDF____.exe Token: SeDebugPrivilege 2016 cscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Request For Price and Availability_PDF____.exeExplorer.EXEcscript.exedescription pid process target process PID 1312 wrote to memory of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 1312 wrote to memory of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 1312 wrote to memory of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 1312 wrote to memory of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 1312 wrote to memory of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 1312 wrote to memory of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 1312 wrote to memory of 2348 1312 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 1196 wrote to memory of 2016 1196 Explorer.EXE cscript.exe PID 1196 wrote to memory of 2016 1196 Explorer.EXE cscript.exe PID 1196 wrote to memory of 2016 1196 Explorer.EXE cscript.exe PID 1196 wrote to memory of 2016 1196 Explorer.EXE cscript.exe PID 2016 wrote to memory of 2740 2016 cscript.exe cmd.exe PID 2016 wrote to memory of 2740 2016 cscript.exe cmd.exe PID 2016 wrote to memory of 2740 2016 cscript.exe cmd.exe PID 2016 wrote to memory of 2740 2016 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1196-20-0x00000000062F0000-0x00000000063E4000-memory.dmpFilesize
976KB
-
memory/1196-33-0x0000000007620000-0x0000000007719000-memory.dmpFilesize
996KB
-
memory/1196-31-0x0000000007620000-0x0000000007719000-memory.dmpFilesize
996KB
-
memory/1196-30-0x0000000007620000-0x0000000007719000-memory.dmpFilesize
996KB
-
memory/1196-26-0x00000000062F0000-0x00000000063E4000-memory.dmpFilesize
976KB
-
memory/1312-15-0x00000000744F0000-0x0000000074BDE000-memory.dmpFilesize
6.9MB
-
memory/1312-5-0x0000000004F10000-0x0000000004F50000-memory.dmpFilesize
256KB
-
memory/1312-7-0x00000000048E0000-0x000000000494E000-memory.dmpFilesize
440KB
-
memory/1312-1-0x00000000744F0000-0x0000000074BDE000-memory.dmpFilesize
6.9MB
-
memory/1312-2-0x0000000004F10000-0x0000000004F50000-memory.dmpFilesize
256KB
-
memory/1312-3-0x0000000000430000-0x0000000000444000-memory.dmpFilesize
80KB
-
memory/1312-4-0x00000000744F0000-0x0000000074BDE000-memory.dmpFilesize
6.9MB
-
memory/1312-0-0x0000000000360000-0x00000000003F0000-memory.dmpFilesize
576KB
-
memory/1312-6-0x0000000000460000-0x000000000046E000-memory.dmpFilesize
56KB
-
memory/2016-25-0x0000000000070000-0x000000000009F000-memory.dmpFilesize
188KB
-
memory/2016-21-0x00000000001E0000-0x0000000000202000-memory.dmpFilesize
136KB
-
memory/2016-22-0x00000000001E0000-0x0000000000202000-memory.dmpFilesize
136KB
-
memory/2016-23-0x0000000000070000-0x000000000009F000-memory.dmpFilesize
188KB
-
memory/2016-24-0x0000000002200000-0x0000000002503000-memory.dmpFilesize
3.0MB
-
memory/2016-28-0x0000000000590000-0x0000000000624000-memory.dmpFilesize
592KB
-
memory/2348-19-0x00000000002B0000-0x00000000002C5000-memory.dmpFilesize
84KB
-
memory/2348-18-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2348-16-0x00000000008D0000-0x0000000000BD3000-memory.dmpFilesize
3.0MB
-
memory/2348-14-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2348-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2348-10-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2348-8-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB