Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
BASF PETRONAS Chemicals Request For Quotation.exe
Resource
win7-20240704-en
General
-
Target
BASF PETRONAS Chemicals Request For Quotation.exe
-
Size
1.1MB
-
MD5
66e0bb9c0260fe4eb10e6c6868ea2a77
-
SHA1
f9ca35c22c827757b168be84d7ff746be855755b
-
SHA256
cfe4c0048184b00ed3af5a0a191baf693752c793f010ae05c3caff2253052d12
-
SHA512
3572972cbd1f08ab3add9d32d1785d066fd9eab9b248cbb33969d9f8fbac2c600050e4c5931f247e5acbbf20bb8e30e01513ecae4033f060b07a314b078e8e7c
-
SSDEEP
24576:3AHnh+eWsN3skA4RV1Hom2KXMmHa9ZLa5KmMb0e3F+X5:qh+ZkldoPK8Ya9ZLatMb0e3w
Malware Config
Extracted
formbook
4.1
wh6a
tair-lift-42713.bond
ventura-homes.net
anvasbackred.shop
icksandmore.net
untsvilleboatrentals.net
xyv.lat
hbvc.xyz
uang88-toko.xyz
ersonalisedwrappingpaper.online
reepoin1.buzz
hosemansisthis.xyz
64kyt6v.christmas
qgbiwbk.shop
reywolfcdn.net
rupovvz.online
ras-es-0.bond
latitudinarian.world
eamautorent.online
rioritymarketingsolutions.world
merican-viplata-peoplleua.world
stronavigation.website
analones-51-us-spn.today
etjuidl.shop
andscaping-services-69347.bond
ransportationmdsmtpro.top
ufeyu.online
esterspace.xyz
races-dental-splints-20853.bond
ipplikj.click
ir-bez-graniz.net
panish-classes-58894.bond
ext4you.net
1game.fyi
tnfw3193.vip
ntyvirus.online
et988.shop
2q.biz
uke-saaab.buzz
nline-shopping-41258.bond
lbazar.net
24876.top
50p.xyz
oleccionamera.xyz
uperapp.app
2578.asia
fgwalzk.xyz
ecretoasiatico.fun
325555.vip
uayang1982.net
ert-gep.info
gc4cpam.christmas
eyzz.online
hampi.info
panish-classes-63390.bond
qzxx.top
cessovip.tech
oth.live
orekotusurubu.shop
eolives.net
urebets.vip
amigataboyz-dreamisland.net
9ds87666.men
rycoz.online
8dn2r1us2.buzz
nfotracktmc.top
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3428-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3428-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2304-20-0x0000000001060000-0x000000000108F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1868 set thread context of 3428 1868 BASF PETRONAS Chemicals Request For Quotation.exe 88 PID 3428 set thread context of 3440 3428 svchost.exe 56 PID 2304 set thread context of 3440 2304 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BASF PETRONAS Chemicals Request For Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3428 svchost.exe 3428 svchost.exe 3428 svchost.exe 3428 svchost.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe 2304 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1868 BASF PETRONAS Chemicals Request For Quotation.exe 3428 svchost.exe 3428 svchost.exe 3428 svchost.exe 2304 msdt.exe 2304 msdt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3428 svchost.exe Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeDebugPrivilege 2304 msdt.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3440 Explorer.EXE 3440 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3428 1868 BASF PETRONAS Chemicals Request For Quotation.exe 88 PID 1868 wrote to memory of 3428 1868 BASF PETRONAS Chemicals Request For Quotation.exe 88 PID 1868 wrote to memory of 3428 1868 BASF PETRONAS Chemicals Request For Quotation.exe 88 PID 1868 wrote to memory of 3428 1868 BASF PETRONAS Chemicals Request For Quotation.exe 88 PID 3440 wrote to memory of 2304 3440 Explorer.EXE 89 PID 3440 wrote to memory of 2304 3440 Explorer.EXE 89 PID 3440 wrote to memory of 2304 3440 Explorer.EXE 89 PID 2304 wrote to memory of 5036 2304 msdt.exe 95 PID 2304 wrote to memory of 5036 2304 msdt.exe 95 PID 2304 wrote to memory of 5036 2304 msdt.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals Request For Quotation.exe"C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals Request For Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals Request For Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-