Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
Maersk Scan Docs.exe
Resource
win7-20240903-en
General
-
Target
Maersk Scan Docs.exe
-
Size
516KB
-
MD5
95c48652559f05a64085bfe6e35aa29f
-
SHA1
29b0c7589cb4404815c83a033c2b87813387e9b7
-
SHA256
f1def9617ca9f7ac437dfbd6d67b37af2779827c2c66b89ac80b6f6f6279f173
-
SHA512
95260fb7ab3d104869c3624bbf030f626f31eac4305964c71340afbe9b837299b180e5af0129f155869cc1743fd4907ca123a7c98b6f04ee8c74246041e846b4
-
SSDEEP
12288:ucmcDYNKgACB6CK8bWOuqynw0+je1syX/OycmcD:PDUn29qynw0+j4lX/8D
Malware Config
Extracted
formbook
3.9
ch
dfjz88.com
realtorscreek.com
pl8v5z.info
thicdienthoai.com
areauruguay.com
shimizu-yado.com
apples5.com
hothip.net
jm-legal.online
bkinfo28.online
edificiosakura.net
biodesixlungreflex.com
segurosblanco.com
atsintech.solutions
steuerberaterfinden.com
ojjul.com
udcomputer.com
grovescashflow.com
inglot-jlo.com
docteursnuisible.com
dragonscience.com
fzmyk06.com
yongyingbao.com
paulbak.com
xhtd819.com
brnthz.info
sixteenfoxes.com
afcct-ladiesinredlunch.com
alohaessentialoils.today
peoplearentprops.com
xn--udsw05j.ink
arche-webdesign.com
every-kid.com
gofindit.biz
onebyone.group
kitch.film
pristine.ventures
shippingyoga.com
selfishdeals.com
masakatsugaru.com
thegreat401kripoff.info
0gc2t8.info
cwhqaq.com
nicerack.world
drvandoreva.com
1024ccco.info
mairuizi.com
mixjockey.productions
henichou.com
hoteldealscatcher.com
automobilagent.com
colourfulmalaysia.com
lovethelittle.com
tpcnamway.info
bluewong880519.com
healthylife-confident.com
chibitzer.com
kanbures.reisen
gzxhx168.com
islippostprom.net
stxentertainiment.com
auwed.com
rokoko.design
petitkevin.com
saibez.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2380-4-0x0000000000400000-0x0000000000486000-memory.dmp formbook behavioral1/memory/2380-8-0x0000000000400000-0x0000000000486000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2380 set thread context of 1200 2380 Maersk Scan Docs.exe 21 PID 3020 set thread context of 1200 3020 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maersk Scan Docs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2380 Maersk Scan Docs.exe 2380 Maersk Scan Docs.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2380 Maersk Scan Docs.exe 2380 Maersk Scan Docs.exe 2380 Maersk Scan Docs.exe 3020 explorer.exe 3020 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2380 Maersk Scan Docs.exe Token: SeDebugPrivilege 3020 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2380 Maersk Scan Docs.exe 2380 Maersk Scan Docs.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2380 Maersk Scan Docs.exe 2380 Maersk Scan Docs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2380 Maersk Scan Docs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3020 1200 Explorer.EXE 31 PID 1200 wrote to memory of 3020 1200 Explorer.EXE 31 PID 1200 wrote to memory of 3020 1200 Explorer.EXE 31 PID 1200 wrote to memory of 3020 1200 Explorer.EXE 31 PID 3020 wrote to memory of 2952 3020 explorer.exe 32 PID 3020 wrote to memory of 2952 3020 explorer.exe 32 PID 3020 wrote to memory of 2952 3020 explorer.exe 32 PID 3020 wrote to memory of 2952 3020 explorer.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Maersk Scan Docs.exe"C:\Users\Admin\AppData\Local\Temp\Maersk Scan Docs.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Maersk Scan Docs.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2952
-
-