Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
PO2024_pdf.exe
Resource
win7-20240708-en
General
-
Target
PO2024_pdf.exe
-
Size
1.1MB
-
MD5
bc980d4328f0dba55926b45ea5599d09
-
SHA1
d31b2056d30e49a6f655779acf088e96e6d452ab
-
SHA256
8bd5c8d980c76cd62711f609edde9ffe19b97ab154f7b8e81c563db304be1e52
-
SHA512
250085c1979997557ae4c39258c34db0ab1ecd8ae248c4ac772b47c708b115aa72f0e234a3f81298d786edb53309f022bb84d68cf6cd678697fa87df9b93bb0b
-
SSDEEP
24576:rqDEvCTbMWu7rQYlBQcBiT6rprG8a8j5Mq3kwQaI8xN:rTvC/MTQYxsWR7a8jdI8x
Malware Config
Extracted
formbook
4.1
ph01
23888.sbs
zvcj.sbs
raitpourtrait.net
ibraryfarmclub.online
omputercourses123.live
j88.doctor
atsue-color.click
epitalrentgrup.online
rvvpn.lol
i-signals.tech
cr-phoenix.best
frican-safari.online
c-games.zone
oardetest.online
f4md.shop
uke-saaac.buzz
arze.dev
nvestment-services-49610.bond
izatrip.sbs
ameron-paaaa.buzz
esourceshark.info
ovamedrx.net
yzena.tech
ichardsjewelers.shop
olar-panel-jobs-67676.bond
oreanewspapers.top
olcon.live
evzuatakademi.online
ackdoortwinks.net
s23301.top
ool-works.net
inhhuan5g.sbs
redit-cards-se-9.bond
9509.club
athroomremodeling-pa-us2.click
obbypetrino.shop
uliet707.vip
bvcaz.xyz
ppcashvip.online
d-animation-degree-99775.bond
p39.xyz
hatsapz8.top
eamidiots.shop
mujo57abmb6c9me.app
edinvest.tech
hiskerwonderspro.yachts
glczs.shop
andscaping-services-69969.bond
93wh245ds.autos
arubear.shop
yqwzijbfrh9.asia
hiramon.cloud
5cbrx.shop
ahjong168.vip
echanictrainingsearch.today
lientserver.cfd
eeklybyte.net
oanweb.live
astbaytreecareservice.info
47000.xyz
r-software-14916.bond
8376.club
ublimax.online
uckchina.net
ootdetoxes.shop
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1484-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1484-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/316-20-0x0000000000FA0000-0x0000000000FCF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3356 set thread context of 1484 3356 PO2024_pdf.exe 87 PID 1484 set thread context of 3404 1484 svchost.exe 56 PID 316 set thread context of 3404 316 msdt.exe 56 -
Program crash 1 IoCs
pid pid_target Process procid_target 2328 3356 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO2024_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1484 svchost.exe 1484 svchost.exe 1484 svchost.exe 1484 svchost.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe 316 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3356 PO2024_pdf.exe 1484 svchost.exe 1484 svchost.exe 1484 svchost.exe 316 msdt.exe 316 msdt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1484 svchost.exe Token: SeShutdownPrivilege 3404 Explorer.EXE Token: SeCreatePagefilePrivilege 3404 Explorer.EXE Token: SeShutdownPrivilege 3404 Explorer.EXE Token: SeCreatePagefilePrivilege 3404 Explorer.EXE Token: SeDebugPrivilege 316 msdt.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3356 PO2024_pdf.exe 3356 PO2024_pdf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3356 PO2024_pdf.exe 3356 PO2024_pdf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3404 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3356 wrote to memory of 1484 3356 PO2024_pdf.exe 87 PID 3356 wrote to memory of 1484 3356 PO2024_pdf.exe 87 PID 3356 wrote to memory of 1484 3356 PO2024_pdf.exe 87 PID 3356 wrote to memory of 1484 3356 PO2024_pdf.exe 87 PID 3404 wrote to memory of 316 3404 Explorer.EXE 92 PID 3404 wrote to memory of 316 3404 Explorer.EXE 92 PID 3404 wrote to memory of 316 3404 Explorer.EXE 92 PID 316 wrote to memory of 4884 316 msdt.exe 93 PID 316 wrote to memory of 4884 316 msdt.exe 93 PID 316 wrote to memory of 4884 316 msdt.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\PO2024_pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO2024_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PO2024_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6883⤵
- Program crash
PID:2328
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3356 -ip 33561⤵PID:5004