Analysis
-
max time kernel
300s -
max time network
270s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 09:12
Behavioral task
behavioral1
Sample
RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe
Resource
win7-20240708-en
General
-
Target
RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe
-
Size
959KB
-
MD5
a4be50bb39110e49c1d2fc87ccc12f56
-
SHA1
ffc4874f95b0c774ad54988350128eadfaeebc23
-
SHA256
b967a8b7765a762514d4b8d172fabb655af83d7279fd15cd513e217675ce96a9
-
SHA512
241476b5ab26dc7a8673daca8cb6b76b46b9e87092e09e7db643368b8514d439e1bf502a42b9f6b082ce2fc92c3ca2141bd34e8068bc77820c06d4892242f575
-
SSDEEP
24576:hiUmSB/o5d1ubcvLiUlytyo/bfUbycmjNlscnVDO8TR+KDV:h/mU/ohubcvhMXQb6kcROgIKD
Malware Config
Extracted
formbook
4.1
bs26
bhkflatforsale.today
89486.cyou
asstortlawsuit-26.today
935fkg.top
lanetaryadventure.website
5-77.xyz
yankosensei.top
esasi.boats
ortasmundial.online
gfo.net
mhgriu.xyz
440.top
52zh366hq.bond
arage-door-tab.fun
heriffburns.info
ndogamingslot.club
lrinstlusa.today
ssdefdhet.fun
dbg.net
ome-remodeling-82737.bond
sychology-degree-49198.bond
eon-zerkalo-obd1.buzz
46sj488ux.bond
138hoki.yachts
ircuit-board-assembler-us.bond
raphic-design-degree-98455.bond
erherseershjrre.buzz
ekabit.online
impemos.cyou
otgoingback24.net
ust.digital
lsheikh.click
mail-marketing-57276.bond
hampion-casino-fhy.buzz
irtyf-ingrancher.info
ustomaglow.xyz
efloristika.online
djinni.buzz
egaplex.dev
oundroutdoors.club
aco.lol
reme.delivery
oursocialclub.xyz
ffertop.online
dinfotech.info
ydzndy.biz
og-walker-jobs-62009.bond
verybodyeats.services
earchgpt.homes
njoei.click
yler-paaac.buzz
mni-streak.net
aaldemo.click
rectionpower.online
sian.lol
belivedi.cfd
d516249.online
nfluencer-marketing-89430.bond
ransportationmqmptpro.top
ymortgagebusinesssucks.shop
931.bet
ruise-jobs-39837.bond
nglessemneura.shop
sed-cars-81272.bond
34679.sbs
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2356-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2356-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2356-28-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2744-34-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 name.exe -
Loads dropped DLL 1 IoCs
pid Process 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe -
resource yara_rule behavioral1/memory/464-0-0x0000000000ED0000-0x00000000010DB000-memory.dmp upx behavioral1/files/0x000a0000000163b8-5.dat upx behavioral1/memory/464-9-0x0000000000ED0000-0x00000000010DB000-memory.dmp upx behavioral1/memory/2016-11-0x0000000000970000-0x0000000000B7B000-memory.dmp upx behavioral1/memory/2016-20-0x0000000000970000-0x0000000000B7B000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/464-9-0x0000000000ED0000-0x00000000010DB000-memory.dmp autoit_exe behavioral1/memory/2016-20-0x0000000000970000-0x0000000000B7B000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2016 set thread context of 2356 2016 name.exe 31 PID 2356 set thread context of 1124 2356 svchost.exe 20 PID 2356 set thread context of 1124 2356 svchost.exe 20 PID 2744 set thread context of 1124 2744 chkdsk.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2356 svchost.exe 2356 svchost.exe 2356 svchost.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe 2744 chkdsk.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2016 name.exe 2356 svchost.exe 2356 svchost.exe 2356 svchost.exe 2356 svchost.exe 2744 chkdsk.exe 2744 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2356 svchost.exe Token: SeDebugPrivilege 2744 chkdsk.exe Token: SeShutdownPrivilege 1124 Explorer.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 2016 name.exe 2016 name.exe 1124 Explorer.EXE 1124 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 2016 name.exe 2016 name.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 464 wrote to memory of 2016 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 30 PID 464 wrote to memory of 2016 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 30 PID 464 wrote to memory of 2016 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 30 PID 464 wrote to memory of 2016 464 RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 30 PID 2016 wrote to memory of 2356 2016 name.exe 31 PID 2016 wrote to memory of 2356 2016 name.exe 31 PID 2016 wrote to memory of 2356 2016 name.exe 31 PID 2016 wrote to memory of 2356 2016 name.exe 31 PID 2016 wrote to memory of 2356 2016 name.exe 31 PID 1124 wrote to memory of 2744 1124 Explorer.EXE 33 PID 1124 wrote to memory of 2744 1124 Explorer.EXE 33 PID 1124 wrote to memory of 2744 1124 Explorer.EXE 33 PID 1124 wrote to memory of 2744 1124 Explorer.EXE 33 PID 2744 wrote to memory of 2812 2744 chkdsk.exe 34 PID 2744 wrote to memory of 2812 2744 chkdsk.exe 34 PID 2744 wrote to memory of 2812 2744 chkdsk.exe 34 PID 2744 wrote to memory of 2812 2744 chkdsk.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"C:\Users\Admin\AppData\Local\Temp\RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959KB
MD5a4be50bb39110e49c1d2fc87ccc12f56
SHA1ffc4874f95b0c774ad54988350128eadfaeebc23
SHA256b967a8b7765a762514d4b8d172fabb655af83d7279fd15cd513e217675ce96a9
SHA512241476b5ab26dc7a8673daca8cb6b76b46b9e87092e09e7db643368b8514d439e1bf502a42b9f6b082ce2fc92c3ca2141bd34e8068bc77820c06d4892242f575