Analysis
-
max time kernel
95s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
Quote Order.exe
Resource
win7-20240903-en
General
-
Target
Quote Order.exe
-
Size
408KB
-
MD5
2d180e659ae8180b343e4abddc7f304c
-
SHA1
7725c303e9ea8e747666436b913c5491b16a8952
-
SHA256
6fed5f74f0fa613ef25311cfc20d8b38abc5cf4b4c9183e34aa7386882dcf1ee
-
SHA512
37c38c59e0e629b5d28c930886eea0096530c42d473ef70f5a6aa53801bdb6386e1fe154cd6b0904325a82268dd0372355fb0fa0a401c06c5e725091e087e201
-
SSDEEP
6144:Lmb3/DGv75a3j51E+S6bjNeksVG9tAA1tIX3NYi/cXZ6TGJy:ZD5aTEb6nzdGA1tIYi/cXZY
Malware Config
Extracted
formbook
4.1
na10
tetheus.com
ventlikeyoumeanit.com
tintbliss.com
rinabet357.com
sapphireboutiqueusa.com
abc8bet6.com
xzcn3i7jb13cqei.buzz
pinktravelsnagpur.com
bt365038.com
rtpbossujang303.shop
osthirmaker.com
thelonelyteacup.com
rlc2019.com
couverture-charpente.com
productivagc.com
defendercarcare.com
abcentixdigital.com
petco.ltd
oypivh.top
micro.guru
hokivegasslots.club
5663876.com
symboleffekt.info
tworiverlabsintake.com
pegaso.store
sasoera.com
material.chat
taniamckirdy.com
dansistosproductions.com
moromorojp.com
z27e1thx976ez3u.buzz
skinrenue.com
nbvci.xyz
jakobniinja.xyz
snykee.com
sl24.top
wawturkiye.xyz
virtualeventsbyelaine.com
giorgiaclerico.com
d9psk8.xyz
hard-to-miss.space
awclog.com
topcomparativos.com
somoyboutique.com
findlove.pro
zbo170.app
dexcoenergy.com
nona23.lat
ingelset.com
hexatelier.com
nftees.tech
visionarymaterialsinstitute.com
khanyos.com
bz59.top
migraine-treatment-28778.bond
catboxbot.online
kkugames.com
llmsearchoptimization.com
fipbhvvb.xyz
vmytzptc.xyz
intermediafx.shop
lhrrs.com
grimreapervalley.com
discount-fess.space
liamcollinai.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3160-15-0x0000000000B00000-0x0000000000B2F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4144 set thread context of 3160 4144 Quote Order.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 3244 3160 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote Order.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4144 Quote Order.exe 4144 Quote Order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4144 Quote Order.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4144 wrote to memory of 3160 4144 Quote Order.exe 93 PID 4144 wrote to memory of 3160 4144 Quote Order.exe 93 PID 4144 wrote to memory of 3160 4144 Quote Order.exe 93 PID 4144 wrote to memory of 3160 4144 Quote Order.exe 93 PID 4144 wrote to memory of 3160 4144 Quote Order.exe 93 PID 4144 wrote to memory of 3160 4144 Quote Order.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote Order.exe"C:\Users\Admin\AppData\Local\Temp\Quote Order.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Quote Order.exe"C:\Users\Admin\AppData\Local\Temp\Quote Order.exe"2⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 1843⤵
- Program crash
PID:3244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3160 -ip 31601⤵PID:1340