Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
ordem de compra xxx50922 pdf.exe
Resource
win7-20230831-en
General
-
Target
ordem de compra xxx50922 pdf.exe
-
Size
690KB
-
MD5
28993f4b93647dabe6603cbb21a7adb3
-
SHA1
c2b2a34e7f52d5c173e8982f27783b74347d7e78
-
SHA256
92901e1afa61d81882eaf7e1bc51fb693adce114a24e769cf234e1ad15109398
-
SHA512
d8da8a4e5bdafef7f0a15b948bf632d2538bc360120b5d4ed1fa64b581bea8ab66f07bb329947ccec039401f976a229b39245e86860a42794680bfcbce0c65d6
-
SSDEEP
12288:y06gea2iNP1UF+fSTk+UJtZheVI1m1i65w4BV61RdpNmMEeyxbkN8mZ65+:1Tf1FQUqMhtq75wlpNRBpNcI
Malware Config
Extracted
formbook
4.1
m0d5
thedaintydesign.com
floramiracle.com
k-runimport.com
aquafoodsupply.com
smultipleslogistics.com
althard.com
nicklawsoncreative.com
mting.link
salvadorsdream.com
vijmas.xyz
thornspeakers.com
dsales-academy.com
yesquw.xyz
shosjhdj.sbs
erasmusplusprojects.com
infinity506.com
lojaalphaelite.com
pixelmagicpath.top
primeshiftemporium.site
hssk1k4y.top
waterheaterdanville.com
wearebuildingbalance.com
runfang.asia
careertreeapp.com
sheesstickershop.com
cdsdaz.com
anunagpal.com
delayed-delivery.info
tamara-bauer.com
fashfactory.com
vhvpp.cfd
167931.com
lsiprobe.com
hayaken-renova.com
xuyunet.com
bvty1585.com
loralieula3783.top
heat-pumps-94944.bond
yugugus.club
ldkcc.com
shoptopspopular.com
klumerclo.com
u2shoponline.com
room-divider-11001.bond
021021.space
dhandhahainboss.com
hempdude.pro
tarjeta-credito-1.today
bbqwarriors.club
emryxvppsddt.xyz
achecanoga.online
boomtiger-777.online
agcalls.com
zxvxx.cfd
sofootu.club
metalbuildingmonster.com
ghayurtransport.com
erptodayaward.com
awra.app
fone10.com
cibolaventures.com
8m0wj3os.top
vrinsured.com
arsplaw.com
i4stationary.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2564-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3056 set thread context of 2564 3056 ordem de compra xxx50922 pdf.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1288 2564 WerFault.exe 34 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3056 ordem de compra xxx50922 pdf.exe 3056 ordem de compra xxx50922 pdf.exe 3056 ordem de compra xxx50922 pdf.exe 3056 ordem de compra xxx50922 pdf.exe 2540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3056 ordem de compra xxx50922 pdf.exe Token: SeDebugPrivilege 2540 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2540 3056 ordem de compra xxx50922 pdf.exe 30 PID 3056 wrote to memory of 2540 3056 ordem de compra xxx50922 pdf.exe 30 PID 3056 wrote to memory of 2540 3056 ordem de compra xxx50922 pdf.exe 30 PID 3056 wrote to memory of 2540 3056 ordem de compra xxx50922 pdf.exe 30 PID 3056 wrote to memory of 2460 3056 ordem de compra xxx50922 pdf.exe 32 PID 3056 wrote to memory of 2460 3056 ordem de compra xxx50922 pdf.exe 32 PID 3056 wrote to memory of 2460 3056 ordem de compra xxx50922 pdf.exe 32 PID 3056 wrote to memory of 2460 3056 ordem de compra xxx50922 pdf.exe 32 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 3056 wrote to memory of 2564 3056 ordem de compra xxx50922 pdf.exe 34 PID 2564 wrote to memory of 1288 2564 RegSvcs.exe 35 PID 2564 wrote to memory of 1288 2564 RegSvcs.exe 35 PID 2564 wrote to memory of 1288 2564 RegSvcs.exe 35 PID 2564 wrote to memory of 1288 2564 RegSvcs.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ordem de compra xxx50922 pdf.exe"C:\Users\Admin\AppData\Local\Temp\ordem de compra xxx50922 pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nkmcwV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nkmcwV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp16EA.tmp"2⤵
- Creates scheduled task(s)
PID:2460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 363⤵
- Program crash
PID:1288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d72d77c2b8367ad6c1869cc9baaf8b81
SHA12ff85f3fce8fe13bf80a83b399e211ef327fa8d6
SHA256ac94a2c3cb0e44d02ef6206cb91dfe91f0ad8b8b14935aa1821ba82cc4f6acf1
SHA512b28dec2a1794940248753716fb1cd6c55ad894337953a13e10c49fd513b897a8ed9578fce7a77acb0827bc5c3d477c5d2a41880c5bc7f1e032a5d7def06c5115