Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
Euro40000order.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Euro40000order.exe
Resource
win10v2004-20240802-en
General
-
Target
Euro40000order.exe
-
Size
750KB
-
MD5
43d33d32b8a2dfcd192f568f297c7d07
-
SHA1
989d2ec220dfe0c39dfc97f824c6916c7214f380
-
SHA256
886bbd99a81dac59ab10515a0595fc8c32753c1fe929c4558157b17085ed5b58
-
SHA512
4eeb5f84ffc3223bb73334e10449c31f6229eee8a823346d11e4c59cc324d237ea0e483e1c04d0c7fcba0e4a13138e6802ce50aaf786b5296c0e657e1a13c22c
-
SSDEEP
6144:6u7EzoMvj6R3GPPd2fj0NXMvKTgy1PI8dPPYwztLdW+9yp1zqv5mZzhw181LfCS0:6uIbMedQ2JG6Ywzq9OeMP23G
Malware Config
Extracted
formbook
3.9
m52
v7536.com
jvvieira.com
woodenspoonbakehouse.com
exdij9.com
nadimkka.com
studentcoins.net
bitcoinmom.info
bxdycgm.com
jepkvrg.com
bitpu.net
autokredit-ohne-schufa.info
pvo.direct
lawyervideonetwork.com
n2pcc.com
fauxtoblonde.net
guayansistsfromm.win
wwwjsh100.com
run2build.com
sscmc.win
intogroup.win
smithsgas.wales
riskmanagementform.com
augasdepontevedra.net
tonyhaas-mail.net
stefanhaering.com
8vcou8.info
tanja-tremel-photography.com
online-engineering.online
advinegypt.com
negocios-inteligentes.com
ecodaralqalam.com
pnxphotography.com
crmpatron.com
quicklylookly.com
sherryfelixhomes.com
solitairecreations.net
eanbonus.com
ilikeireland.com
wcbwxrbg.com
bleach.network
wundernews.online
liverpoolsufeedback.com
rgrneetacademy.com
jeansza.com
monicamoscow.com
xn--fiq6i729o.com
chipatolisaheb.com
cyclespeak.com
the-ugroup.com
suhrjewelrydesigns.info
juqirenqz.com
hsiba.com
parksidewindhaven.com
gearbiotics.party
idrillfloor.com
velibra.net
liquidtreecbd-oil.com
lacedupglamour.com
kansai-honesty.info
ppqfy.info
confidentbeauty.tips
movirani.com
panoramathearena.com
2190pe.com
cybep.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2736-10-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2736-14-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2692 set thread context of 2736 2692 Euro40000order.exe 30 PID 2736 set thread context of 1424 2736 vbc.exe 21 PID 2508 set thread context of 1424 2508 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Euro40000order.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2736 vbc.exe 2736 vbc.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe 2508 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2736 vbc.exe 2736 vbc.exe 2736 vbc.exe 2508 chkdsk.exe 2508 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2736 vbc.exe Token: SeDebugPrivilege 2508 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2736 2692 Euro40000order.exe 30 PID 2692 wrote to memory of 2736 2692 Euro40000order.exe 30 PID 2692 wrote to memory of 2736 2692 Euro40000order.exe 30 PID 2692 wrote to memory of 2736 2692 Euro40000order.exe 30 PID 2692 wrote to memory of 2736 2692 Euro40000order.exe 30 PID 2692 wrote to memory of 2736 2692 Euro40000order.exe 30 PID 2692 wrote to memory of 2736 2692 Euro40000order.exe 30 PID 1424 wrote to memory of 2508 1424 Explorer.EXE 31 PID 1424 wrote to memory of 2508 1424 Explorer.EXE 31 PID 1424 wrote to memory of 2508 1424 Explorer.EXE 31 PID 1424 wrote to memory of 2508 1424 Explorer.EXE 31 PID 2508 wrote to memory of 2540 2508 chkdsk.exe 32 PID 2508 wrote to memory of 2540 2508 chkdsk.exe 32 PID 2508 wrote to memory of 2540 2508 chkdsk.exe 32 PID 2508 wrote to memory of 2540 2508 chkdsk.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Euro40000order.exe"C:\Users\Admin\AppData\Local\Temp\Euro40000order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-