Analysis
-
max time kernel
134s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
New Order_pdf.exe
Resource
win7-20240708-en
General
-
Target
New Order_pdf.exe
-
Size
1.2MB
-
MD5
5bda6ed02bf9ee30fcee815cd3e600c0
-
SHA1
82644c7ccc6c3366603c812c7c86b44d827f2408
-
SHA256
1f7acc55a13b6884c4cba7686c7f28cc5bdbbd9fd32947335044db368d2dea2d
-
SHA512
38cc0b9e2f5263bb5f28e0ec708a6042f324fcd18b211e674e83ae59acc7cceec142c2a95efd2f328fb1fde5dcdd65a213e1ee76e7bd9552bfce079056ffe11f
-
SSDEEP
24576:yqDEvCTbMWu7rQYlBQcBiT6rprG8aX4Z+EsFAWNmU/s:yTvC/MTQYxsWR7aX4Z4FAWNmU
Malware Config
Extracted
formbook
4.1
ph01
23888.sbs
zvcj.sbs
raitpourtrait.net
ibraryfarmclub.online
omputercourses123.live
j88.doctor
atsue-color.click
epitalrentgrup.online
rvvpn.lol
i-signals.tech
cr-phoenix.best
frican-safari.online
c-games.zone
oardetest.online
f4md.shop
uke-saaac.buzz
arze.dev
nvestment-services-49610.bond
izatrip.sbs
ameron-paaaa.buzz
esourceshark.info
ovamedrx.net
yzena.tech
ichardsjewelers.shop
olar-panel-jobs-67676.bond
oreanewspapers.top
olcon.live
evzuatakademi.online
ackdoortwinks.net
s23301.top
ool-works.net
inhhuan5g.sbs
redit-cards-se-9.bond
9509.club
athroomremodeling-pa-us2.click
obbypetrino.shop
uliet707.vip
bvcaz.xyz
ppcashvip.online
d-animation-degree-99775.bond
p39.xyz
hatsapz8.top
eamidiots.shop
mujo57abmb6c9me.app
edinvest.tech
hiskerwonderspro.yachts
glczs.shop
andscaping-services-69969.bond
93wh245ds.autos
arubear.shop
yqwzijbfrh9.asia
hiramon.cloud
5cbrx.shop
ahjong168.vip
echanictrainingsearch.today
lientserver.cfd
eeklybyte.net
oanweb.live
astbaytreecareservice.info
47000.xyz
r-software-14916.bond
8376.club
ublimax.online
uckchina.net
ootdetoxes.shop
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/244-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/244-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/244-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 596 set thread context of 244 596 New Order_pdf.exe 91 PID 244 set thread context of 3500 244 svchost.exe 56 PID 244 set thread context of 3500 244 svchost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order_pdf.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 596 New Order_pdf.exe 244 svchost.exe 244 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 244 svchost.exe Token: SeShutdownPrivilege 3500 Explorer.EXE Token: SeCreatePagefilePrivilege 3500 Explorer.EXE Token: SeShutdownPrivilege 3500 Explorer.EXE Token: SeCreatePagefilePrivilege 3500 Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 596 New Order_pdf.exe 596 New Order_pdf.exe 596 New Order_pdf.exe 596 New Order_pdf.exe 596 New Order_pdf.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 596 New Order_pdf.exe 596 New Order_pdf.exe 596 New Order_pdf.exe 596 New Order_pdf.exe 596 New Order_pdf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3500 Explorer.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 596 wrote to memory of 244 596 New Order_pdf.exe 91 PID 596 wrote to memory of 244 596 New Order_pdf.exe 91 PID 596 wrote to memory of 244 596 New Order_pdf.exe 91 PID 596 wrote to memory of 244 596 New Order_pdf.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\New Order_pdf.exe"C:\Users\Admin\AppData\Local\Temp\New Order_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\New Order_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-