Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 06:51
Static task
static1
Behavioral task
behavioral1
Sample
Invoice & Banking details.exe
Resource
win7-20231020-en
General
-
Target
Invoice & Banking details.exe
-
Size
307KB
-
MD5
b7da48db7a0e6e435e4b3bf5c2d17f6d
-
SHA1
fe98e3ac512441fa49833268753a517bfc712b35
-
SHA256
c4f6b7795e7c6267497a352a75628f59778b0345d719fb49eca4967a681b5728
-
SHA512
99e53ef8460ca9bdc46773bf9f0dc5b01d122b9ea253ce540a494a794c2727b4cd35d9822284b9bcafc135b9c6fe9e9833dda5368a4d784df23cfca215e8ceea
-
SSDEEP
6144:dDmad57Xe1l33j30xXoLT9Q5XFwWhNf6kV7qzjsw4IytBw5wk3:dKqXom5XF1hNf6a7lpxBvk3
Malware Config
Extracted
formbook
4.1
o11y
bilenoer.online
1gocasino.click
bm9qn.top
wzefoy.com
5-minutemoney.com
tx5288.com
ssteaq.com
ztxsm2gxqvl.asia
familyfishing.world
moocytrading.com
dondebusques.com
dtservicesillinois.com
korpativnighs.com
resilientjoy.com
greensclps.com
actionkillsfear.com
siwu81.com
localorion.online
spoke99.com
taxinhanh24h.site
viptop77.pro
okriches.com
steakf990.gay
synicationrescuefunds.com
teambaddiesent.com
sierarhodes.com
web-it.digital
agileadgen.com
keepjimbo.com
zslhthui.com
loganlawanda.com
kidssestablish.com
gamebaidoithuong51.vip
insungflex.com
christaafful.com
nextwavekorea.com
cmbw.club
caturdaily.com
ndbth.fun
valorant-rich.com
gripspeedofficial.com
psniederrhein.com
thriveil-stores.com
xb633.vip
viqvp.fun
fashiusta.com
mxvoly.xyz
lyttoncosmetics.com
5q3.info
yid999.com
kingstoniansupportersclub.com
nivara.diamonds
iptvbooth.com
savagelogisticsandservices.com
thevurp.com
fjkvv3.top
mzwcn.com
pumpkinspicedonuts.com
capitalloanssolution.com
sug2news.online
wile7.net
nordpost.shop
vastcapybarra.com
xyzb0451.com
shelterinds.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1936-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1936-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1132-18-0x0000000000D80000-0x0000000000DAF000-memory.dmp formbook behavioral2/memory/1132-20-0x0000000000D80000-0x0000000000DAF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 208 set thread context of 1936 208 Invoice & Banking details.exe 84 PID 1936 set thread context of 3300 1936 Invoice & Banking details.exe 40 PID 1132 set thread context of 3300 1132 cmd.exe 40 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1936 Invoice & Banking details.exe 1936 Invoice & Banking details.exe 1936 Invoice & Banking details.exe 1936 Invoice & Banking details.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe 1132 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3300 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1936 Invoice & Banking details.exe 1936 Invoice & Banking details.exe 1936 Invoice & Banking details.exe 1132 cmd.exe 1132 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1936 Invoice & Banking details.exe Token: SeDebugPrivilege 1132 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3300 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 208 wrote to memory of 1936 208 Invoice & Banking details.exe 84 PID 208 wrote to memory of 1936 208 Invoice & Banking details.exe 84 PID 208 wrote to memory of 1936 208 Invoice & Banking details.exe 84 PID 208 wrote to memory of 1936 208 Invoice & Banking details.exe 84 PID 208 wrote to memory of 1936 208 Invoice & Banking details.exe 84 PID 208 wrote to memory of 1936 208 Invoice & Banking details.exe 84 PID 3300 wrote to memory of 1132 3300 Explorer.EXE 88 PID 3300 wrote to memory of 1132 3300 Explorer.EXE 88 PID 3300 wrote to memory of 1132 3300 Explorer.EXE 88 PID 1132 wrote to memory of 2140 1132 cmd.exe 94 PID 1132 wrote to memory of 2140 1132 cmd.exe 94 PID 1132 wrote to memory of 2140 1132 cmd.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:4868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice & Banking details.exe"3⤵PID:2140
-
-