Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
BASF PETRONAS Chemicals Request For Quotation.exe
Resource
win7-20240704-en
General
-
Target
BASF PETRONAS Chemicals Request For Quotation.exe
-
Size
1.1MB
-
MD5
66e0bb9c0260fe4eb10e6c6868ea2a77
-
SHA1
f9ca35c22c827757b168be84d7ff746be855755b
-
SHA256
cfe4c0048184b00ed3af5a0a191baf693752c793f010ae05c3caff2253052d12
-
SHA512
3572972cbd1f08ab3add9d32d1785d066fd9eab9b248cbb33969d9f8fbac2c600050e4c5931f247e5acbbf20bb8e30e01513ecae4033f060b07a314b078e8e7c
-
SSDEEP
24576:3AHnh+eWsN3skA4RV1Hom2KXMmHa9ZLa5KmMb0e3F+X5:qh+ZkldoPK8Ya9ZLatMb0e3w
Malware Config
Extracted
formbook
4.1
wh6a
tair-lift-42713.bond
ventura-homes.net
anvasbackred.shop
icksandmore.net
untsvilleboatrentals.net
xyv.lat
hbvc.xyz
uang88-toko.xyz
ersonalisedwrappingpaper.online
reepoin1.buzz
hosemansisthis.xyz
64kyt6v.christmas
qgbiwbk.shop
reywolfcdn.net
rupovvz.online
ras-es-0.bond
latitudinarian.world
eamautorent.online
rioritymarketingsolutions.world
merican-viplata-peoplleua.world
stronavigation.website
analones-51-us-spn.today
etjuidl.shop
andscaping-services-69347.bond
ransportationmdsmtpro.top
ufeyu.online
esterspace.xyz
races-dental-splints-20853.bond
ipplikj.click
ir-bez-graniz.net
panish-classes-58894.bond
ext4you.net
1game.fyi
tnfw3193.vip
ntyvirus.online
et988.shop
2q.biz
uke-saaab.buzz
nline-shopping-41258.bond
lbazar.net
24876.top
50p.xyz
oleccionamera.xyz
uperapp.app
2578.asia
fgwalzk.xyz
ecretoasiatico.fun
325555.vip
uayang1982.net
ert-gep.info
gc4cpam.christmas
eyzz.online
hampi.info
panish-classes-63390.bond
qzxx.top
cessovip.tech
oth.live
orekotusurubu.shop
eolives.net
urebets.vip
amigataboyz-dreamisland.net
9ds87666.men
rycoz.online
8dn2r1us2.buzz
nfotracktmc.top
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2164-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2164-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2164-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2224 set thread context of 2164 2224 BASF PETRONAS Chemicals Request For Quotation.exe 28 PID 2164 set thread context of 1324 2164 svchost.exe 21 PID 2164 set thread context of 1324 2164 svchost.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 1172 2156 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BASF PETRONAS Chemicals Request For Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2224 BASF PETRONAS Chemicals Request For Quotation.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2164 svchost.exe Token: SeShutdownPrivilege 1324 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2164 2224 BASF PETRONAS Chemicals Request For Quotation.exe 28 PID 2224 wrote to memory of 2164 2224 BASF PETRONAS Chemicals Request For Quotation.exe 28 PID 2224 wrote to memory of 2164 2224 BASF PETRONAS Chemicals Request For Quotation.exe 28 PID 2224 wrote to memory of 2164 2224 BASF PETRONAS Chemicals Request For Quotation.exe 28 PID 2224 wrote to memory of 2164 2224 BASF PETRONAS Chemicals Request For Quotation.exe 28 PID 1324 wrote to memory of 2156 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2156 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2156 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2156 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2156 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2156 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2156 1324 Explorer.EXE 31 PID 2156 wrote to memory of 1172 2156 msiexec.exe 32 PID 2156 wrote to memory of 1172 2156 msiexec.exe 32 PID 2156 wrote to memory of 1172 2156 msiexec.exe 32 PID 2156 wrote to memory of 1172 2156 msiexec.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals Request For Quotation.exe"C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals Request For Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals Request For Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 2683⤵
- Program crash
PID:1172
-
-