Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 15:56
Static task
static1
Behavioral task
behavioral1
Sample
Request For Price and Availability_PDF____.exe
Resource
win7-20230831-en
General
-
Target
Request For Price and Availability_PDF____.exe
-
Size
554KB
-
MD5
7247c2f218df48a7bd824f33f86b1760
-
SHA1
675a63f975c572ce3c761688a8224e80bce90cd0
-
SHA256
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c
-
SHA512
4051997473e621298980c0a0e44548f3bd648c70ac79afb10e96ea995570f3754a600aec823abab285dd370b033f8913642316f0c87e7d97b210ee30582ea372
-
SSDEEP
12288:8ud04ufv0zINbr57FQ6gUNYitOrlrFpIrlO+A:Rd+f3BQ6gUGVlrgr
Malware Config
Extracted
formbook
4.1
gg62
refrigerators-pk.today
jajifi.fun
fivonworld.com
rangbangs.com
server-dell.com
jefevirtual.com
jobode.info
grindhardgarage.com
gaoxiba168.com
thekotturfund.com
taberla.com
santorinieshop.com
ajptqqex.click
johnjaen.com
innovantdev.com
mjofvsea2.com
yun0796.com
rokovoko.nexus
tuabogado.gratis
jqinnovation.online
ciayo103.click
duyguyildiz.com
amchemda.com
saleproductsp.cyou
scenestealersnyc.com
zeetaplasttech.com
gdiamonddesigns.com
theblackmanofwatsap.com
hcw5858.com
oxsvabil.click
locomotiveframeinspections.com
hpkpbqdj.click
laughhub.net
seedtutoring.com
buydomain.info
tomyhammer.com
vxometry.com
honghuomart.top
solsimst.com
rajdeep.digital
capybaraerc.live
talmeshak.com
tayloryourdata.com
aspd.info
ki70dr.xyz
ketolockegypt.com
allsystemselectricians.com
besorcio.store
babeandbeauties.com
fitstylepro.com
openbinders.com
jiipwheels.net
businessed.xyz
mexpbe.xyz
hartyandsmith.com
implantedentalprecios.today
mynt.email
logisticswarehousinghub.com
dollhousesecrets.com
pt007.vip
tundeogunnusiandco.com
iavg.store
lingbdnv.click
jiangyuze.link
schinfler.com
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4708-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4708-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4708-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1684-23-0x0000000000C90000-0x0000000000CBF000-memory.dmp formbook behavioral2/memory/1684-26-0x0000000000C90000-0x0000000000CBF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Request For Price and Availability_PDF____.exeRequest For Price and Availability_PDF____.exeNETSTAT.EXEdescription pid process target process PID 4716 set thread context of 4708 4716 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 4708 set thread context of 3268 4708 Request For Price and Availability_PDF____.exe Explorer.EXE PID 4708 set thread context of 3268 4708 Request For Price and Availability_PDF____.exe Explorer.EXE PID 1684 set thread context of 3268 1684 NETSTAT.EXE Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 1684 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
Request For Price and Availability_PDF____.exeNETSTAT.EXEpid process 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE 1684 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Request For Price and Availability_PDF____.exeNETSTAT.EXEpid process 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 4708 Request For Price and Availability_PDF____.exe 1684 NETSTAT.EXE 1684 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Request For Price and Availability_PDF____.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 4708 Request For Price and Availability_PDF____.exe Token: SeDebugPrivilege 1684 NETSTAT.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3268 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Request For Price and Availability_PDF____.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 4716 wrote to memory of 4708 4716 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 4716 wrote to memory of 4708 4716 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 4716 wrote to memory of 4708 4716 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 4716 wrote to memory of 4708 4716 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 4716 wrote to memory of 4708 4716 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 4716 wrote to memory of 4708 4716 Request For Price and Availability_PDF____.exe Request For Price and Availability_PDF____.exe PID 3268 wrote to memory of 1684 3268 Explorer.EXE NETSTAT.EXE PID 3268 wrote to memory of 1684 3268 Explorer.EXE NETSTAT.EXE PID 3268 wrote to memory of 1684 3268 Explorer.EXE NETSTAT.EXE PID 1684 wrote to memory of 1876 1684 NETSTAT.EXE cmd.exe PID 1684 wrote to memory of 1876 1684 NETSTAT.EXE cmd.exe PID 1684 wrote to memory of 1876 1684 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request For Price and Availability_PDF____.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1684-21-0x0000000000C40000-0x0000000000C4B000-memory.dmpFilesize
44KB
-
memory/1684-29-0x0000000001490000-0x0000000001524000-memory.dmpFilesize
592KB
-
memory/1684-26-0x0000000000C90000-0x0000000000CBF000-memory.dmpFilesize
188KB
-
memory/1684-25-0x00000000016F0000-0x0000000001A3A000-memory.dmpFilesize
3.3MB
-
memory/1684-23-0x0000000000C90000-0x0000000000CBF000-memory.dmpFilesize
188KB
-
memory/1684-22-0x0000000000C40000-0x0000000000C4B000-memory.dmpFilesize
44KB
-
memory/3268-24-0x0000000008D80000-0x0000000008EF4000-memory.dmpFilesize
1.5MB
-
memory/3268-16-0x0000000008D80000-0x0000000008EF4000-memory.dmpFilesize
1.5MB
-
memory/3268-33-0x0000000009800000-0x000000000990B000-memory.dmpFilesize
1.0MB
-
memory/3268-31-0x0000000009800000-0x000000000990B000-memory.dmpFilesize
1.0MB
-
memory/3268-30-0x0000000009800000-0x000000000990B000-memory.dmpFilesize
1.0MB
-
memory/3268-27-0x00000000096C0000-0x00000000097F2000-memory.dmpFilesize
1.2MB
-
memory/3268-20-0x00000000096C0000-0x00000000097F2000-memory.dmpFilesize
1.2MB
-
memory/4708-19-0x00000000016F0000-0x0000000001705000-memory.dmpFilesize
84KB
-
memory/4708-15-0x0000000001470000-0x0000000001485000-memory.dmpFilesize
84KB
-
memory/4708-18-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4708-14-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4708-9-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4708-12-0x0000000001750000-0x0000000001A9A000-memory.dmpFilesize
3.3MB
-
memory/4716-4-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB
-
memory/4716-5-0x0000000005740000-0x000000000574A000-memory.dmpFilesize
40KB
-
memory/4716-0-0x0000000074B90000-0x0000000075340000-memory.dmpFilesize
7.7MB
-
memory/4716-3-0x00000000055A0000-0x0000000005632000-memory.dmpFilesize
584KB
-
memory/4716-2-0x0000000005AB0000-0x0000000006054000-memory.dmpFilesize
5.6MB
-
memory/4716-6-0x0000000005890000-0x000000000592C000-memory.dmpFilesize
624KB
-
memory/4716-1-0x0000000000B70000-0x0000000000C00000-memory.dmpFilesize
576KB
-
memory/4716-11-0x0000000074B90000-0x0000000075340000-memory.dmpFilesize
7.7MB
-
memory/4716-7-0x0000000074B90000-0x0000000075340000-memory.dmpFilesize
7.7MB
-
memory/4716-8-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB