Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
PO2024_pdf.exe
Resource
win7-20240708-en
General
-
Target
PO2024_pdf.exe
-
Size
1.1MB
-
MD5
bc980d4328f0dba55926b45ea5599d09
-
SHA1
d31b2056d30e49a6f655779acf088e96e6d452ab
-
SHA256
8bd5c8d980c76cd62711f609edde9ffe19b97ab154f7b8e81c563db304be1e52
-
SHA512
250085c1979997557ae4c39258c34db0ab1ecd8ae248c4ac772b47c708b115aa72f0e234a3f81298d786edb53309f022bb84d68cf6cd678697fa87df9b93bb0b
-
SSDEEP
24576:rqDEvCTbMWu7rQYlBQcBiT6rprG8a8j5Mq3kwQaI8xN:rTvC/MTQYxsWR7a8jdI8x
Malware Config
Extracted
formbook
4.1
ph01
23888.sbs
zvcj.sbs
raitpourtrait.net
ibraryfarmclub.online
omputercourses123.live
j88.doctor
atsue-color.click
epitalrentgrup.online
rvvpn.lol
i-signals.tech
cr-phoenix.best
frican-safari.online
c-games.zone
oardetest.online
f4md.shop
uke-saaac.buzz
arze.dev
nvestment-services-49610.bond
izatrip.sbs
ameron-paaaa.buzz
esourceshark.info
ovamedrx.net
yzena.tech
ichardsjewelers.shop
olar-panel-jobs-67676.bond
oreanewspapers.top
olcon.live
evzuatakademi.online
ackdoortwinks.net
s23301.top
ool-works.net
inhhuan5g.sbs
redit-cards-se-9.bond
9509.club
athroomremodeling-pa-us2.click
obbypetrino.shop
uliet707.vip
bvcaz.xyz
ppcashvip.online
d-animation-degree-99775.bond
p39.xyz
hatsapz8.top
eamidiots.shop
mujo57abmb6c9me.app
edinvest.tech
hiskerwonderspro.yachts
glczs.shop
andscaping-services-69969.bond
93wh245ds.autos
arubear.shop
yqwzijbfrh9.asia
hiramon.cloud
5cbrx.shop
ahjong168.vip
echanictrainingsearch.today
lientserver.cfd
eeklybyte.net
oanweb.live
astbaytreecareservice.info
47000.xyz
r-software-14916.bond
8376.club
ublimax.online
uckchina.net
ootdetoxes.shop
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2444-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2444-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2444-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2504 set thread context of 2444 2504 PO2024_pdf.exe 30 PID 2444 set thread context of 1172 2444 svchost.exe 21 PID 2444 set thread context of 1172 2444 svchost.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO2024_pdf.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2504 PO2024_pdf.exe 2444 svchost.exe 2444 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2444 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2504 PO2024_pdf.exe 2504 PO2024_pdf.exe 1172 Explorer.EXE 1172 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2504 PO2024_pdf.exe 2504 PO2024_pdf.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2444 2504 PO2024_pdf.exe 30 PID 2504 wrote to memory of 2444 2504 PO2024_pdf.exe 30 PID 2504 wrote to memory of 2444 2504 PO2024_pdf.exe 30 PID 2504 wrote to memory of 2444 2504 PO2024_pdf.exe 30 PID 2504 wrote to memory of 2444 2504 PO2024_pdf.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\PO2024_pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO2024_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PO2024_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-