Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/07/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip.pdf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Payment Slip.pdf.exe
Resource
win10v2004-20240709-en
General
-
Target
Payment Slip.pdf.exe
-
Size
286KB
-
MD5
fd6e85afa80f7c36795bc58dc4d1fa86
-
SHA1
419dd6e6e6a1a6753ca51e1612ea6bc61a011d48
-
SHA256
985fb6bd28653c5012113b096e61bebb49fe5aeeb53c7a128d323803637cf6cd
-
SHA512
9d9279ddb6e3988371a7ca714ade52e4983eb7df7c3e6bdf322e530c44c730b8b43f4bb943800c842ee4b54bcdbf3341be066a05bdd4fa72e4e2b69db05c3a01
-
SSDEEP
6144:UhntRj86y2xrIYaHInYgeEVgaQSTxU2ZxmSHM/:KntR5tQtvE6tSxUYxDs
Malware Config
Extracted
formbook
4.1
tnk
lafioletto.com
mgiuj.com
wolllafvixzies.win
wwwsbvip123.com
nadyaasnae.com
noticesinvoice2017.com
intercapati.com
tg8895.com
9245654874.com
lytsxc.info
rffuf3-liquidwebsites.com
verguet.com
peinturefleursetfemmes.com
xttmrama.com
cryptoinvestmentideas.com
kikumasacarparts.win
freeapk1.com
tasteofimagination.com
gxzyoa.com
cq-mingwei.com
tctczy.com
nafo.ltd
worstcase.store
stockbridgepsychic.com
askmewhat.men
howtobuyabitcoinwallet.com
cataddictshop.com
sauersautorepair.com
godslittlejewels.com
cckkpbqr.com
ludd67671.com
dowzysound.com
groopkhat.com
northfloridavalue.com
xvideosssss.com
cryptocasinoadvisor.com
zen-aromatherapy.com
wevr.ltd
domainhemat.com
choraclechocolate.com
passiveannuity.com
juggernaut.live
marijuanadeveloper.com
yilujiu.com
georgiapsychologists.com
michelegcharrier.com
kn6htm.com
freemporium.com
going-native.com
matrixbathsystems.com
deborah-theocspecialist.com
broader97.com
zeit-wert.com
mcx4m6x.info
ettumanoormahadevatemple.com
developsbyirfan.com
u2mee.com
1788valleyspringsave.com
rjclassic.com
shiyuan.site
leahschmittpt.com
zssheep.com
zhaocaizhan.com
supposedlysierra.com
doneym.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2932-12-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2932-16-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1652 set thread context of 2932 1652 Payment Slip.pdf.exe 31 PID 2932 set thread context of 1200 2932 Payment Slip.pdf.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2724 2752 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Slip.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 Payment Slip.pdf.exe 2932 Payment Slip.pdf.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2932 Payment Slip.pdf.exe 2932 Payment Slip.pdf.exe 2932 Payment Slip.pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 Payment Slip.pdf.exe Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2932 1652 Payment Slip.pdf.exe 31 PID 1652 wrote to memory of 2932 1652 Payment Slip.pdf.exe 31 PID 1652 wrote to memory of 2932 1652 Payment Slip.pdf.exe 31 PID 1652 wrote to memory of 2932 1652 Payment Slip.pdf.exe 31 PID 1652 wrote to memory of 2932 1652 Payment Slip.pdf.exe 31 PID 1652 wrote to memory of 2932 1652 Payment Slip.pdf.exe 31 PID 1652 wrote to memory of 2932 1652 Payment Slip.pdf.exe 31 PID 1200 wrote to memory of 2752 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2752 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2752 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2752 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2752 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2752 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2752 1200 Explorer.EXE 32 PID 2752 wrote to memory of 2724 2752 msiexec.exe 33 PID 2752 wrote to memory of 2724 2752 msiexec.exe 33 PID 2752 wrote to memory of 2724 2752 msiexec.exe 33 PID 2752 wrote to memory of 2724 2752 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2683⤵
- Program crash
PID:2724
-
-