Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.exe
Resource
win7-20240708-en
General
-
Target
Payment_Advice.exe
-
Size
815KB
-
MD5
05a028bf7e8b4118a97a57552fc4ba0c
-
SHA1
9e71f8d3fd4bddb603c4c1803c867cade9be7a83
-
SHA256
8d692269e00163075c2d1bdeea0d8fe0ebb06c791233f692fa76e766095ec3ad
-
SHA512
df27cb22cbd3ee8faa970ce11217ac408c5e91e6cb4f81ad9f50b520cdebc216fee99ac022c41db449981ceadf5fdd4516b536641dbaf5a291125053b484a867
-
SSDEEP
12288:PYHdm1fBr+IwICEMytGbPGcbXDbE1Qla6RgVcP/7kvDxul+arudZt7dLBU37eimx:PyAiIlCPtfIv9XTp9Be7OqX5y6
Malware Config
Extracted
formbook
4.1
tmo
myplace.design
geersa.info
rhysbdowning.com
pandorainiciatives.com
affiliate-beginning-gently.com
anitcruiserun.live
xn--6kr11w.com
everhopeimaging.com
drmdb.com
regen.media
ibizacarobcompany.com
keramikstubeboehme.info
bleedingwords.com
potbringer.com
opposingavatars.com
ljubljana-city.com
saltsmangarcia.com
5551071.com
thelawofficeofrkeithbrown.com
fukugyou-style.com
montrealdesigndeclaration.com
miasinky.com
documentingfood.com
jiangxijingji.com
germanaxis.com
coochao.com
telkindestek.com
assekuradeur-kontor.com
adamcwyk.com
961478.com
wuncemir.com
thenomadicview.com
athleticsilver.com
xn--fiq6i04kyoe.com
orderalley.com
opebet126.com
xci178.com
alphafinancelimited.com
bridgesgrp.com
wwwyh8800.com
asesoriacam.com
findcrazygolf.com
revitalizationstation.com
thegoodpeoplenetwork.com
wuyangjianshen.com
yong8999.com
crystalchanphotography.com
aimplem.com
hanaemi.design
ss-realestate.com
iyapedia.com
stormbuck.com
nonprofitmom.com
ahalloffamelife.net
lbduyi.info
powforecast.com
29sk78.com
lumm67671.com
sctalida.com
intelligentea.com
xvideospajas.com
qepe.ltd
roygonzalez.net
hnzhenlan.com
lodipytu.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2740-3-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2740-7-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2740-11-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2688 set thread context of 2740 2688 Payment_Advice.exe 30 PID 2740 set thread context of 1096 2740 Payment_Advice.exe 20 PID 2740 set thread context of 1096 2740 Payment_Advice.exe 20 PID 2812 set thread context of 1096 2812 svchost.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment_Advice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2688 Payment_Advice.exe 2740 Payment_Advice.exe 2740 Payment_Advice.exe 2740 Payment_Advice.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe 2812 svchost.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2688 Payment_Advice.exe 2740 Payment_Advice.exe 2740 Payment_Advice.exe 2740 Payment_Advice.exe 2740 Payment_Advice.exe 2812 svchost.exe 2812 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 Payment_Advice.exe Token: SeDebugPrivilege 2812 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2740 2688 Payment_Advice.exe 30 PID 2688 wrote to memory of 2740 2688 Payment_Advice.exe 30 PID 2688 wrote to memory of 2740 2688 Payment_Advice.exe 30 PID 2688 wrote to memory of 2740 2688 Payment_Advice.exe 30 PID 1096 wrote to memory of 2812 1096 Explorer.EXE 31 PID 1096 wrote to memory of 2812 1096 Explorer.EXE 31 PID 1096 wrote to memory of 2812 1096 Explorer.EXE 31 PID 1096 wrote to memory of 2812 1096 Explorer.EXE 31 PID 2812 wrote to memory of 2568 2812 svchost.exe 32 PID 2812 wrote to memory of 2568 2812 svchost.exe 32 PID 2812 wrote to memory of 2568 2812 svchost.exe 32 PID 2812 wrote to memory of 2568 2812 svchost.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2568
-
-