Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
13-11-2023 06:51
Static task
static1
Behavioral task
behavioral1
Sample
Invoice & Banking details.exe
Resource
win7-20231020-en
General
-
Target
Invoice & Banking details.exe
-
Size
307KB
-
MD5
b7da48db7a0e6e435e4b3bf5c2d17f6d
-
SHA1
fe98e3ac512441fa49833268753a517bfc712b35
-
SHA256
c4f6b7795e7c6267497a352a75628f59778b0345d719fb49eca4967a681b5728
-
SHA512
99e53ef8460ca9bdc46773bf9f0dc5b01d122b9ea253ce540a494a794c2727b4cd35d9822284b9bcafc135b9c6fe9e9833dda5368a4d784df23cfca215e8ceea
-
SSDEEP
6144:dDmad57Xe1l33j30xXoLT9Q5XFwWhNf6kV7qzjsw4IytBw5wk3:dKqXom5XF1hNf6a7lpxBvk3
Malware Config
Extracted
formbook
4.1
o11y
bilenoer.online
1gocasino.click
bm9qn.top
wzefoy.com
5-minutemoney.com
tx5288.com
ssteaq.com
ztxsm2gxqvl.asia
familyfishing.world
moocytrading.com
dondebusques.com
dtservicesillinois.com
korpativnighs.com
resilientjoy.com
greensclps.com
actionkillsfear.com
siwu81.com
localorion.online
spoke99.com
taxinhanh24h.site
viptop77.pro
okriches.com
steakf990.gay
synicationrescuefunds.com
teambaddiesent.com
sierarhodes.com
web-it.digital
agileadgen.com
keepjimbo.com
zslhthui.com
loganlawanda.com
kidssestablish.com
gamebaidoithuong51.vip
insungflex.com
christaafful.com
nextwavekorea.com
cmbw.club
caturdaily.com
ndbth.fun
valorant-rich.com
gripspeedofficial.com
psniederrhein.com
thriveil-stores.com
xb633.vip
viqvp.fun
fashiusta.com
mxvoly.xyz
lyttoncosmetics.com
5q3.info
yid999.com
kingstoniansupportersclub.com
nivara.diamonds
iptvbooth.com
savagelogisticsandservices.com
thevurp.com
fjkvv3.top
mzwcn.com
pumpkinspicedonuts.com
capitalloanssolution.com
sug2news.online
wile7.net
nordpost.shop
vastcapybarra.com
xyzb0451.com
shelterinds.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2668-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2668-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2668-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2696-23-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2696-25-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2932 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2660 set thread context of 2668 2660 Invoice & Banking details.exe 28 PID 2668 set thread context of 1260 2668 Invoice & Banking details.exe 13 PID 2668 set thread context of 1260 2668 Invoice & Banking details.exe 13 PID 2696 set thread context of 1260 2696 msdt.exe 13 -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2668 Invoice & Banking details.exe 2668 Invoice & Banking details.exe 2668 Invoice & Banking details.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe 2696 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2668 Invoice & Banking details.exe 2668 Invoice & Banking details.exe 2668 Invoice & Banking details.exe 2668 Invoice & Banking details.exe 2696 msdt.exe 2696 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2668 Invoice & Banking details.exe Token: SeDebugPrivilege 2696 msdt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2668 2660 Invoice & Banking details.exe 28 PID 2660 wrote to memory of 2668 2660 Invoice & Banking details.exe 28 PID 2660 wrote to memory of 2668 2660 Invoice & Banking details.exe 28 PID 2660 wrote to memory of 2668 2660 Invoice & Banking details.exe 28 PID 2660 wrote to memory of 2668 2660 Invoice & Banking details.exe 28 PID 2660 wrote to memory of 2668 2660 Invoice & Banking details.exe 28 PID 2660 wrote to memory of 2668 2660 Invoice & Banking details.exe 28 PID 1260 wrote to memory of 2696 1260 Explorer.EXE 29 PID 1260 wrote to memory of 2696 1260 Explorer.EXE 29 PID 1260 wrote to memory of 2696 1260 Explorer.EXE 29 PID 1260 wrote to memory of 2696 1260 Explorer.EXE 29 PID 2696 wrote to memory of 2932 2696 msdt.exe 30 PID 2696 wrote to memory of 2932 2696 msdt.exe 30 PID 2696 wrote to memory of 2932 2696 msdt.exe 30 PID 2696 wrote to memory of 2932 2696 msdt.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"3⤵
- Deletes itself
PID:2932
-
-