Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation...pdf.exe
Resource
win7-20240221-en
General
-
Target
Request for Quotation...pdf.exe
-
Size
885KB
-
MD5
c489912068a72c74eb218562beeaaf8a
-
SHA1
6348afcd2c4645d983f6982bc3271646a3049fd5
-
SHA256
78ddeffb28de453b1235da58833f3e8532635bf556fb2ef23e25aa58b15506b0
-
SHA512
3d0ad7e47472b69026658d64017cc8aa30843c5757b521bb6edc7fdf8ec9a3bff889233ab38c8b3e58308beea2c150498ff78edef01b93107b3843881618b4b3
-
SSDEEP
12288:E3hYkBcPwb/nRlnGWsDzvFXQKoXVtnL+BpD2ePG72HrV7:hK/RlnE58fnKrvPG7gr
Malware Config
Extracted
formbook
4.1
jdge
cungcaptapvu.com
lantianren.net
mydivorcepsychologist.com
bageurapparel.com
citydealmaker.com
historyegress.com
litekkutu.xyz
perksofkerala.com
flairmax.com
washingmachineservicerepair.xyz
organicbeauty.club
rehmazbeauty.com
goodgly.com
imtheonlyperson.systems
shbanjia199.com
mwfbd.com
halsonpipe.com
0927487.com
perfectpeachco.com
danielprok.com
townertoren.com
innerviewreflectionsofyou.com
fudgroups.info
ostfriesensuende.com
instafreefollowers.xyz
cryfortrade.com
wepavela.com
dwj-xj9bt.net
tiyujsqicai.com
chothuethietbiquayphim.com
behintejaratpourasa.com
thenotaryexperts.com
fncconline.com
poapay-com.xyz
nieght.com
tanheidl.com
storycraftinternational.com
freegunsafetytraining.com
latitudedaytonarealty.com
makeupheaven.club
fiathfirst.com
sonicdrovein.com
nationaltimesharerelief.com
crbhub.net
shopmocker.com
diversifiedhiring.com
angularjsacademy.com
jasoncordingleyart.com
healthybenefitsplustlus.com
vienkhopkhangbinh.asia
sstaylace.com
honolulumicroschools.com
zalihancehcp.net
cdnxsalty2.com
ylpsbla.com
bjcci.com
kingfisherwebsitesaustralia.com
distribuidoradetejados.com
xis-technology.com
yuthikaassociates.com
linqingxian.com
aimarshfly.com
simplydeliciouscooking.com
vyvelectricistas.com
headairload.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2148-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2148-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3116-22-0x0000000000360000-0x000000000038E000-memory.dmp formbook behavioral2/memory/3116-28-0x0000000000360000-0x000000000038E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Request for Quotation...pdf.exeRequest for Quotation...pdf.execmstp.exedescription pid process target process PID 5036 set thread context of 2148 5036 Request for Quotation...pdf.exe Request for Quotation...pdf.exe PID 2148 set thread context of 3572 2148 Request for Quotation...pdf.exe Explorer.EXE PID 3116 set thread context of 3572 3116 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
Request for Quotation...pdf.execmstp.exepid process 2148 Request for Quotation...pdf.exe 2148 Request for Quotation...pdf.exe 2148 Request for Quotation...pdf.exe 2148 Request for Quotation...pdf.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe 3116 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Request for Quotation...pdf.execmstp.exepid process 2148 Request for Quotation...pdf.exe 2148 Request for Quotation...pdf.exe 2148 Request for Quotation...pdf.exe 3116 cmstp.exe 3116 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Request for Quotation...pdf.execmstp.exedescription pid process Token: SeDebugPrivilege 2148 Request for Quotation...pdf.exe Token: SeDebugPrivilege 3116 cmstp.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3572 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Request for Quotation...pdf.exeExplorer.EXEcmstp.exedescription pid process target process PID 5036 wrote to memory of 2148 5036 Request for Quotation...pdf.exe Request for Quotation...pdf.exe PID 5036 wrote to memory of 2148 5036 Request for Quotation...pdf.exe Request for Quotation...pdf.exe PID 5036 wrote to memory of 2148 5036 Request for Quotation...pdf.exe Request for Quotation...pdf.exe PID 5036 wrote to memory of 2148 5036 Request for Quotation...pdf.exe Request for Quotation...pdf.exe PID 5036 wrote to memory of 2148 5036 Request for Quotation...pdf.exe Request for Quotation...pdf.exe PID 5036 wrote to memory of 2148 5036 Request for Quotation...pdf.exe Request for Quotation...pdf.exe PID 3572 wrote to memory of 3116 3572 Explorer.EXE cmstp.exe PID 3572 wrote to memory of 3116 3572 Explorer.EXE cmstp.exe PID 3572 wrote to memory of 3116 3572 Explorer.EXE cmstp.exe PID 3116 wrote to memory of 768 3116 cmstp.exe cmd.exe PID 3116 wrote to memory of 768 3116 cmstp.exe cmd.exe PID 3116 wrote to memory of 768 3116 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation...pdf.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation...pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation...pdf.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation...pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request for Quotation...pdf.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2148-12-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2148-17-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2148-18-0x00000000016B0000-0x00000000016C4000-memory.dmpFilesize
80KB
-
memory/2148-15-0x0000000001B90000-0x0000000001EDA000-memory.dmpFilesize
3.3MB
-
memory/3116-23-0x0000000002480000-0x00000000027CA000-memory.dmpFilesize
3.3MB
-
memory/3116-28-0x0000000000360000-0x000000000038E000-memory.dmpFilesize
184KB
-
memory/3116-25-0x00000000023B0000-0x0000000002443000-memory.dmpFilesize
588KB
-
memory/3116-22-0x0000000000360000-0x000000000038E000-memory.dmpFilesize
184KB
-
memory/3116-21-0x0000000000430000-0x0000000000446000-memory.dmpFilesize
88KB
-
memory/3116-20-0x0000000000430000-0x0000000000446000-memory.dmpFilesize
88KB
-
memory/3572-19-0x0000000008CA0000-0x0000000008E10000-memory.dmpFilesize
1.4MB
-
memory/3572-34-0x000000000A8B0000-0x000000000AA2A000-memory.dmpFilesize
1.5MB
-
memory/3572-31-0x000000000A8B0000-0x000000000AA2A000-memory.dmpFilesize
1.5MB
-
memory/3572-30-0x000000000A8B0000-0x000000000AA2A000-memory.dmpFilesize
1.5MB
-
memory/3572-26-0x0000000008CA0000-0x0000000008E10000-memory.dmpFilesize
1.4MB
-
memory/5036-10-0x0000000007620000-0x00000000076D0000-memory.dmpFilesize
704KB
-
memory/5036-1-0x0000000000EF0000-0x0000000000FD4000-memory.dmpFilesize
912KB
-
memory/5036-2-0x0000000006020000-0x00000000065C4000-memory.dmpFilesize
5.6MB
-
memory/5036-3-0x00000000059A0000-0x0000000005A32000-memory.dmpFilesize
584KB
-
memory/5036-14-0x0000000074FD0000-0x0000000075780000-memory.dmpFilesize
7.7MB
-
memory/5036-4-0x0000000005B10000-0x0000000005BAC000-memory.dmpFilesize
624KB
-
memory/5036-0-0x0000000074FD0000-0x0000000075780000-memory.dmpFilesize
7.7MB
-
memory/5036-11-0x0000000009CA0000-0x0000000009CE0000-memory.dmpFilesize
256KB
-
memory/5036-5-0x0000000005D70000-0x0000000005D80000-memory.dmpFilesize
64KB
-
memory/5036-9-0x0000000005D70000-0x0000000005D80000-memory.dmpFilesize
64KB
-
memory/5036-8-0x0000000074FD0000-0x0000000075780000-memory.dmpFilesize
7.7MB
-
memory/5036-7-0x0000000005CE0000-0x0000000005CF8000-memory.dmpFilesize
96KB
-
memory/5036-6-0x0000000005A70000-0x0000000005A7A000-memory.dmpFilesize
40KB