Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.exe
Resource
win7-20240708-en
General
-
Target
Payment_Advice.exe
-
Size
815KB
-
MD5
05a028bf7e8b4118a97a57552fc4ba0c
-
SHA1
9e71f8d3fd4bddb603c4c1803c867cade9be7a83
-
SHA256
8d692269e00163075c2d1bdeea0d8fe0ebb06c791233f692fa76e766095ec3ad
-
SHA512
df27cb22cbd3ee8faa970ce11217ac408c5e91e6cb4f81ad9f50b520cdebc216fee99ac022c41db449981ceadf5fdd4516b536641dbaf5a291125053b484a867
-
SSDEEP
12288:PYHdm1fBr+IwICEMytGbPGcbXDbE1Qla6RgVcP/7kvDxul+arudZt7dLBU37eimx:PyAiIlCPtfIv9XTp9Be7OqX5y6
Malware Config
Extracted
formbook
4.1
tmo
myplace.design
geersa.info
rhysbdowning.com
pandorainiciatives.com
affiliate-beginning-gently.com
anitcruiserun.live
xn--6kr11w.com
everhopeimaging.com
drmdb.com
regen.media
ibizacarobcompany.com
keramikstubeboehme.info
bleedingwords.com
potbringer.com
opposingavatars.com
ljubljana-city.com
saltsmangarcia.com
5551071.com
thelawofficeofrkeithbrown.com
fukugyou-style.com
montrealdesigndeclaration.com
miasinky.com
documentingfood.com
jiangxijingji.com
germanaxis.com
coochao.com
telkindestek.com
assekuradeur-kontor.com
adamcwyk.com
961478.com
wuncemir.com
thenomadicview.com
athleticsilver.com
xn--fiq6i04kyoe.com
orderalley.com
opebet126.com
xci178.com
alphafinancelimited.com
bridgesgrp.com
wwwyh8800.com
asesoriacam.com
findcrazygolf.com
revitalizationstation.com
thegoodpeoplenetwork.com
wuyangjianshen.com
yong8999.com
crystalchanphotography.com
aimplem.com
hanaemi.design
ss-realestate.com
iyapedia.com
stormbuck.com
nonprofitmom.com
ahalloffamelife.net
lbduyi.info
powforecast.com
29sk78.com
lumm67671.com
sctalida.com
intelligentea.com
xvideospajas.com
qepe.ltd
roygonzalez.net
hnzhenlan.com
lodipytu.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3332-1-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/3332-6-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3440 set thread context of 3332 3440 Payment_Advice.exe 85 PID 3332 set thread context of 3516 3332 Payment_Advice.exe 56 PID 852 set thread context of 3516 852 mstsc.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment_Advice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3440 Payment_Advice.exe 3440 Payment_Advice.exe 3332 Payment_Advice.exe 3332 Payment_Advice.exe 3332 Payment_Advice.exe 3332 Payment_Advice.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe 852 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3440 Payment_Advice.exe 3332 Payment_Advice.exe 3332 Payment_Advice.exe 3332 Payment_Advice.exe 852 mstsc.exe 852 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3332 Payment_Advice.exe Token: SeDebugPrivilege 852 mstsc.exe Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3516 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3332 3440 Payment_Advice.exe 85 PID 3440 wrote to memory of 3332 3440 Payment_Advice.exe 85 PID 3440 wrote to memory of 3332 3440 Payment_Advice.exe 85 PID 3516 wrote to memory of 852 3516 Explorer.EXE 87 PID 3516 wrote to memory of 852 3516 Explorer.EXE 87 PID 3516 wrote to memory of 852 3516 Explorer.EXE 87 PID 852 wrote to memory of 724 852 mstsc.exe 92 PID 852 wrote to memory of 724 852 mstsc.exe 92 PID 852 wrote to memory of 724 852 mstsc.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"3⤵
- System Location Discovery: System Language Discovery
PID:724
-
-