Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
Scan 2020227 pdf.exe
Resource
win7-20240903-en
General
-
Target
Scan 2020227 pdf.exe
-
Size
694KB
-
MD5
a68a0b2d4331d61bb64172c9e9786937
-
SHA1
a004b631c2f2aa425e3e6d9e262fb3815aef293b
-
SHA256
461b27147a73d91bf21f4b821d7ae63b35a4efc32a87c14e718caa0644bb1dff
-
SHA512
ad688d2d08e9ca1fab35a90d2fb049c2cddd680d10fef27dbc0da150de69bf3e068aaa9f7d4da4b7efd87623113b4cd3cdbeedd7f3a6ea1b81a82190f6b2da33
-
SSDEEP
12288:fRmJ34UqACPQoKwICzPhVifZWFuGZkTP2bjmgqLMDburpEau8n:f0B4U+Qo5Ph4ZWkQ5egqLC4Wf2
Malware Config
Extracted
formbook
4.1
cxs
modersport.info
egoody.net
qcmutiny.com
theblueberryview.com
rupornofilm.com
katomaviation.com
therograms.net
borealisbasecamp.com
ebooksites.net
clavicon.net
burshopvarcs.win
neilmedchinhhang.com
allamericandreamcafe.info
floridasingers.com
blockchainworker.com
throneonline.com
newentrepreneurkit.com
tit.group
0s0eightother.men
las6p.com
shouzaishizhong.com
xn--ur0a56wo6d.com
velvetcontour.com
eiqai.com
pasadhanamedia.com
advo-net.com
sdgcube.com
royalvegasnodeposit.com
lifestyleuntethered.com
joneskreationsgifts.com
hbsjg.info
2-phase-lift.com
jacuzzihotuboflakeforest.com
boomiac.com
kokopelli-vineyards.net
lepetitcomptoirdelacom.com
kamisogluotomotivgolcuk.com
dailynews.agency
arnoldcecilia.win
patricz.com
vydyn.com
myhealthandgarden.com
celebrityallstar.com
pubgwins.com
assalamherbal222.com
glutathionemax.com
patricia-strong.com
dwujrj.info
amanciohoteles.com
lewiqueen.com
lionsgym.fitness
thefarmbednbreakfast.com
skyehypestudios.com
evescandor.com
chungnhangiaithuong.com
find-arthritisremedy.sale
gekqdap.com
studiowoke.com
uuy26.com
esrec.info
hepsoar.com
pennystockboss.com
fitnesshamster.win
servershed.com
sulicet.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2560-1-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2560-6-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2572 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2992 set thread context of 2560 2992 Scan 2020227 pdf.exe 30 PID 2560 set thread context of 1184 2560 Scan 2020227 pdf.exe 21 PID 2596 set thread context of 1184 2596 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scan 2020227 pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2992 Scan 2020227 pdf.exe 2560 Scan 2020227 pdf.exe 2560 Scan 2020227 pdf.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2992 Scan 2020227 pdf.exe 2560 Scan 2020227 pdf.exe 2560 Scan 2020227 pdf.exe 2560 Scan 2020227 pdf.exe 2596 explorer.exe 2596 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2560 Scan 2020227 pdf.exe Token: SeDebugPrivilege 2596 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2560 2992 Scan 2020227 pdf.exe 30 PID 2992 wrote to memory of 2560 2992 Scan 2020227 pdf.exe 30 PID 2992 wrote to memory of 2560 2992 Scan 2020227 pdf.exe 30 PID 2992 wrote to memory of 2560 2992 Scan 2020227 pdf.exe 30 PID 1184 wrote to memory of 2596 1184 Explorer.EXE 31 PID 1184 wrote to memory of 2596 1184 Explorer.EXE 31 PID 1184 wrote to memory of 2596 1184 Explorer.EXE 31 PID 1184 wrote to memory of 2596 1184 Explorer.EXE 31 PID 2596 wrote to memory of 2572 2596 explorer.exe 32 PID 2596 wrote to memory of 2572 2596 explorer.exe 32 PID 2596 wrote to memory of 2572 2596 explorer.exe 32 PID 2596 wrote to memory of 2572 2596 explorer.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2572
-
-