Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
General Specifications - INVACO PVT.exe
Resource
win7-20240220-en
General
-
Target
General Specifications - INVACO PVT.exe
-
Size
1.4MB
-
MD5
86dc1dcdf5980995145d57d0013223b1
-
SHA1
8df0370d6533d9fa9b356c4d2a074382be12e526
-
SHA256
9d854bdc9a85a09795e1354f1d48f2df47d0fef8d365abf065f287b9c3e7d190
-
SHA512
cb92f042d3f2b1b76b08b61b8fa4e5dd4a9b51daa1807374392f9058accb3d37c56790597faff8abef17b9436f2d8a6c7ebb3580d4ae3c26dcf9bae806523605
-
SSDEEP
24576:IAHnh+eWsN3skA4RV1Hom2KXMmHaI3Kyz/DYDy6cwmb5:Ph+ZkldoPK8YaI3Ky7JT/
Malware Config
Extracted
formbook
4.1
kh11
theluckypaddle.net
assurelinkenterprises.com
gazpachogroup.com
worxservicesllc.com
bestecankurban.com
cotebrief.com
899173.com
navist.io
metaverseharem.com
genpower-plus.com
drhandgrip.com
jessicachristina.com
eidura.com
cat2000andhope1izfanfiction.com
nywaiverlatam.com
cdlb9twt.shop
j2mjewerly.com
itsmisshodges.com
timeis.shop
santefe4g.com
ongame.cloud
guard-dd.online
rutgersorthopedics.com
rkbengg.com
dentalemergencybakersfield.com
jansirani.com
gadilglobal.com
unitygiftingco.store
enxk-32.com
northcuttmediacompany.com
hyyhldz.site
stripperscontest.com
lexcomtech.com
issndiploma.com
shopynuts.site
shpoifypos.app
gamer24.top
dibujosparapintar.net
healthinsuranceudeserve.com
pampadev.tech
whefgf.club
riversandcapital.com
foroupskirt.com
wocan92.top
onehourbookclub.com
brochuresenligne.site
suv-deals-85472.bond
coalswap.com
tresxop.xyz
juniortrevisol.com
it-jobs-87776.bond
black-loan3.shop
chicprems.xyz
pmheiouassessment.shop
186489.support
88mahadewa.vip
vn90129.me
cattaillake.com
jmknoh1r.shop
attitudedancefitness.com
eventcrrate.com
autonomoangola.com
jollshopp.com
thesimplestudio.io
gltip2le.shop
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2560-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2560-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2612-20-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2612-22-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2316 set thread context of 2560 2316 General Specifications - INVACO PVT.exe 28 PID 2560 set thread context of 1196 2560 svchost.exe 21 PID 2612 set thread context of 1196 2612 help.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2980 2316 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2560 svchost.exe 2560 svchost.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe 2612 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2316 General Specifications - INVACO PVT.exe 2560 svchost.exe 2560 svchost.exe 2560 svchost.exe 2612 help.exe 2612 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2560 svchost.exe Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeDebugPrivilege 2612 help.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2316 General Specifications - INVACO PVT.exe 2316 General Specifications - INVACO PVT.exe 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2316 General Specifications - INVACO PVT.exe 2316 General Specifications - INVACO PVT.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2560 2316 General Specifications - INVACO PVT.exe 28 PID 2316 wrote to memory of 2560 2316 General Specifications - INVACO PVT.exe 28 PID 2316 wrote to memory of 2560 2316 General Specifications - INVACO PVT.exe 28 PID 2316 wrote to memory of 2560 2316 General Specifications - INVACO PVT.exe 28 PID 2316 wrote to memory of 2560 2316 General Specifications - INVACO PVT.exe 28 PID 2316 wrote to memory of 2980 2316 General Specifications - INVACO PVT.exe 29 PID 2316 wrote to memory of 2980 2316 General Specifications - INVACO PVT.exe 29 PID 2316 wrote to memory of 2980 2316 General Specifications - INVACO PVT.exe 29 PID 2316 wrote to memory of 2980 2316 General Specifications - INVACO PVT.exe 29 PID 1196 wrote to memory of 2612 1196 Explorer.EXE 30 PID 1196 wrote to memory of 2612 1196 Explorer.EXE 30 PID 1196 wrote to memory of 2612 1196 Explorer.EXE 30 PID 1196 wrote to memory of 2612 1196 Explorer.EXE 30 PID 2612 wrote to memory of 2704 2612 help.exe 31 PID 2612 wrote to memory of 2704 2612 help.exe 31 PID 2612 wrote to memory of 2704 2612 help.exe 31 PID 2612 wrote to memory of 2704 2612 help.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\General Specifications - INVACO PVT.exe"C:\Users\Admin\AppData\Local\Temp\General Specifications - INVACO PVT.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\General Specifications - INVACO PVT.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 3163⤵
- Program crash
PID:2980
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵PID:2704
-
-