Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20240903-en
General
-
Target
invoice.exe
-
Size
384KB
-
MD5
e6fcc19f1ef03db2c4d40dcb949ce40f
-
SHA1
0823317ace170ee272b02368c9a3daa5a292765b
-
SHA256
3f5c9bf874c9e7dbbd79fcafa447c3ae0f35659827f91555ba09a2fa13a862dd
-
SHA512
4bdaab26e5deb5da4fa93dc583da96292f05e40dd0da2b26eb1e33d7b5ce68f3db751586839826d43d9c0202ca2dfb8cccb51eda70c72bde7cf9e80779edc460
-
SSDEEP
6144:yQ78PdlxClB67NxX6JyBVIbMNISinsysqZbMyLYDtVJyg:yFSejXbVhISgdsqZbHLY3
Malware Config
Extracted
formbook
4.1
rs26
amazon-review.info
17kaihuiba.com
timeableholdings.com
techvestorsmultifamily.com
rokketsoftware.com
abbigliamentoagricolo.com
artjiayi.com
smooouse.com
lightcastwired.com
bravuad.com
mr133.com
clubfitdartmouth.com
masturbation-stories.net
yedekparcatreni.com
pureologyrising.com
goodsystem2updating.download
fn4pk8p0o5.com
climatechangersofny.com
shuangxian023.com
lxiuot.men
nhchangxing.com
gekaartliving.com
cqowru.info
calmbomb.science
eegg.ltd
lombokraratour.com
justwatchmovie.info
inclusivelisteningeffect.com
likyapix.com
zojike59.win
wiechmannequity.com
stoptherapycaps.net
cowleyroadmotcentre.com
ruiba360.com
colr.net
odiariodeumamissionaria.com
realizecollective.com
bestcasasparticulares.com
xue2u.com
carolinachildrensmuseum.com
vaborbactam.healthcare
ladygaga.cloud
countfbfda.tech
stieble.com
yyu9fy.com
rusticrootzboutique.com
whyisaaroncaldwellsodamnhot.com
begentlewellness.net
hellobrazen.com
recapped.net
rogerandchristinestravels.com
penjiazi.com
alexandratracey.com
sofianoorani.com
anti-terrorsecurity.today
translationsinberlin.com
bestfriendwhisky.com
ukabhotels.info
grupoacye.com
casmio.com
ctbct.info
gzexchange.com
anewfinances.com
footballsocceragent.com
regulars6.info
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/5080-10-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/5080-14-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/5080-20-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation invoice.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1256 set thread context of 5080 1256 invoice.exe 93 PID 5080 set thread context of 3432 5080 RegSvcs.exe 56 PID 5080 set thread context of 3432 5080 RegSvcs.exe 56 PID 3736 set thread context of 3432 3736 wscript.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invoice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 1256 invoice.exe 5080 RegSvcs.exe 5080 RegSvcs.exe 5080 RegSvcs.exe 5080 RegSvcs.exe 5080 RegSvcs.exe 5080 RegSvcs.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe 3736 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 5080 RegSvcs.exe 5080 RegSvcs.exe 5080 RegSvcs.exe 5080 RegSvcs.exe 3736 wscript.exe 3736 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1256 invoice.exe Token: SeDebugPrivilege 5080 RegSvcs.exe Token: SeDebugPrivilege 3736 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2392 1256 invoice.exe 91 PID 1256 wrote to memory of 2392 1256 invoice.exe 91 PID 1256 wrote to memory of 2392 1256 invoice.exe 91 PID 1256 wrote to memory of 5080 1256 invoice.exe 93 PID 1256 wrote to memory of 5080 1256 invoice.exe 93 PID 1256 wrote to memory of 5080 1256 invoice.exe 93 PID 1256 wrote to memory of 5080 1256 invoice.exe 93 PID 1256 wrote to memory of 5080 1256 invoice.exe 93 PID 1256 wrote to memory of 5080 1256 invoice.exe 93 PID 3432 wrote to memory of 3736 3432 Explorer.EXE 94 PID 3432 wrote to memory of 3736 3432 Explorer.EXE 94 PID 3432 wrote to memory of 3736 3432 Explorer.EXE 94 PID 3736 wrote to memory of 4944 3736 wscript.exe 95 PID 3736 wrote to memory of 4944 3736 wscript.exe 95 PID 3736 wrote to memory of 4944 3736 wscript.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JQGuJQhYCPqeAJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp40AE.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2392
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ae03aa58e2d3c23749b89f65812f46ea
SHA15428d71ddf0420db6d6944a954cd9ce1a203878b
SHA256d0d9de2656b44731f189955a464d199052f0ce8ce2d17217f6d9494d56c54a00
SHA512fe006713048fb459c3970b2ebc7e2edc4aef535d1f31266cf05eba17f7c0dc9f02e1b16dba7da58ffe7bf45c2fc674b11308540f4aae655c44c4677c7b3399e5