Analysis
-
max time kernel
145s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER170624.exe
Resource
win7-20240708-en
General
-
Target
PURCHASE ORDER170624.exe
-
Size
1.1MB
-
MD5
b0896ccaf97625a546e53df07bb98769
-
SHA1
39d66b58804ff0f1b600b910713118041f0ddd4b
-
SHA256
7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861
-
SHA512
2aa7ead5dd4ef225acecd4d56d1735b7041e1e772e5c82f177561638d262daeff4aca86c14a1b1bcaef5d4cf538d65b3bd0d5842a3382559d7727a379f74e50f
-
SSDEEP
24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8acGCRB5I89:1TvC/MTQYxsWR7acjp
Malware Config
Extracted
formbook
4.1
cn14
fgfdwr254u.xyz
arm-uk.com
qoachu.com
radiantpm.christmas
ghacor.delivery
lindasartgmbh.com
agroguasch.com
silverlinedevelopment.net
1000thb.com
bremwq.xyz
qweuiop.top
dental-implants-21860.bond
elotesaguafria.com
biagiottifraticelli.com
pureleafworks.com
mokomusic.com
lunarqr.shop
bestbuyprods.com
michaelsec.com
morganstore.net
adventureswithbeans.com
kavitaforcm.com
irananalog.com
newvisio.com
casino-x-zerkalo8tn6.xyz
attrji115s.top
6eidh1.xyz
gharamedibleoil.com
rtptwitspin.autos
wdzhsy.asia
nocyon.com
pawsomepastriesofgeorgia.com
drnutritionnn.xyz
1fkgfgn98.shop
wangpumen-2hhh222.xyz
ya37w.top
cinematography-jobs-74591.bond
mcboysclub.xyz
3e032.com
trauma911.net
tcsjarky.com
geekstreaming.com
stsfilo.com
pixellab.top
seocuba.com
sos-easyappclient.net
westbournedentalsurgery.com
bookishbusiness.com
ljstf.com
poshyyh.christmas
jasminemariahopkins.com
bdsign.ink
tamracollection.com
alpha-kicks.com
kamramhay.com
bowoslot.lol
epigraphbio.com
tbcxmq834x.top
57-24.sbs
qewpc.asia
insuranceinfoo.xyz
core-forex.net
phenixex.com
14033.shop
thesharkysteps.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/1900-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1900-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2284-22-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2104 set thread context of 1900 2104 PURCHASE ORDER170624.exe 29 PID 1900 set thread context of 1256 1900 svchost.exe 20 PID 2284 set thread context of 1256 2284 cmstp.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PURCHASE ORDER170624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1900 svchost.exe 1900 svchost.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe 2284 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2104 PURCHASE ORDER170624.exe 1900 svchost.exe 1900 svchost.exe 1900 svchost.exe 2284 cmstp.exe 2284 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1900 svchost.exe Token: SeDebugPrivilege 2284 cmstp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1900 2104 PURCHASE ORDER170624.exe 29 PID 2104 wrote to memory of 1900 2104 PURCHASE ORDER170624.exe 29 PID 2104 wrote to memory of 1900 2104 PURCHASE ORDER170624.exe 29 PID 2104 wrote to memory of 1900 2104 PURCHASE ORDER170624.exe 29 PID 2104 wrote to memory of 1900 2104 PURCHASE ORDER170624.exe 29 PID 1256 wrote to memory of 2284 1256 Explorer.EXE 30 PID 1256 wrote to memory of 2284 1256 Explorer.EXE 30 PID 1256 wrote to memory of 2284 1256 Explorer.EXE 30 PID 1256 wrote to memory of 2284 1256 Explorer.EXE 30 PID 1256 wrote to memory of 2284 1256 Explorer.EXE 30 PID 1256 wrote to memory of 2284 1256 Explorer.EXE 30 PID 1256 wrote to memory of 2284 1256 Explorer.EXE 30 PID 2284 wrote to memory of 2028 2284 cmstp.exe 31 PID 2284 wrote to memory of 2028 2284 cmstp.exe 31 PID 2284 wrote to memory of 2028 2284 cmstp.exe 31 PID 2284 wrote to memory of 2028 2284 cmstp.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER170624.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER170624.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER170624.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-