Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
OVERDUE INVOICE.exe
Resource
win7-20240903-en
General
-
Target
OVERDUE INVOICE.exe
-
Size
1.0MB
-
MD5
6ed07d07cf776b88070683adbe3b6668
-
SHA1
6cb4702a3d0eb3f9887b62838772f6f432451caa
-
SHA256
97b4ba35c6feaccb928d2a4921d3f852ca36e70c851fc5edb7ae651efb2a1d61
-
SHA512
27dd5bdf36658c359317812a0ba16ead05991eadf02067831d3278eafa61f197407f1d12bb149dd9c4605afbd8470918d8e53b5595e2e5fdeeaa4c538b5e4c1d
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLJkbOe1vYUdm1JFXC6qzkdzCs3kcZaf:ffmMv6Ckr7Mny5QLaJvYDXpXCivzXm
Malware Config
Extracted
formbook
4.1
ge07
mail-marketing2-9946168.live
ouwmijnweb.net
verythingmars.online
rgqhcy.shop
unter-saaaa.buzz
ox.bio
arkside.top
ransportationmmsktpro.top
lue-ocean-bar.group
lympiccat.xyz
onstruction-jobs-49170.bond
andon-saaab.buzz
fdmw.sbs
48430091.top
yuyh.boats
kyt968.shop
pismedical.shop
ocialmediafactory.xyz
inussofa.shop
ision.fit
himenote.shop
eto-gummies-01010.bond
ummpk.online
bx.mobi
werad-neumann.info
polo77meledak.fun
uel-fleet-cards-60697.bond
asaslotzeed.online
media.group
gfdsq.xyz
stralexploration.website
ltraslot.win
-16.net
hellalee-llc.xyz
cz9mi.digital
mea.tech
ools-59989.bond
y94nt6.vip
ubaimports.online
tlantishealth.online
athing-suits-78317.bond
uxembourgembassypakistan.shop
262jpdhkd.bond
38gk910gy.autos
q345.vip
attlesaber.net
alecell.net
blungit.xyz
anfrontier.net
obic.info
erman3d.shop
igxyuje.click
eartestqa.bond
ar-deals-77763.bond
dormy.click
oodchoicemall.net
otelmanagementdegree.info
ental-health-91275.bond
76jys301.top
asecore.net
oursocialbuzz.buzz
amuel-paaaa.buzz
ercadaoshop.shop
ome-care-37159.bond
ruisjob.today
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2664-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2664-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2664-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2704-18-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2788 set thread context of 2664 2788 OVERDUE INVOICE.exe 30 PID 2664 set thread context of 1344 2664 svchost.exe 21 PID 2664 set thread context of 1344 2664 svchost.exe 21 PID 2704 set thread context of 1344 2704 cmmon32.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OVERDUE INVOICE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe 2704 cmmon32.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2788 OVERDUE INVOICE.exe 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2704 cmmon32.exe 2704 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2664 svchost.exe Token: SeDebugPrivilege 2704 cmmon32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2664 2788 OVERDUE INVOICE.exe 30 PID 2788 wrote to memory of 2664 2788 OVERDUE INVOICE.exe 30 PID 2788 wrote to memory of 2664 2788 OVERDUE INVOICE.exe 30 PID 2788 wrote to memory of 2664 2788 OVERDUE INVOICE.exe 30 PID 2788 wrote to memory of 2664 2788 OVERDUE INVOICE.exe 30 PID 1344 wrote to memory of 2704 1344 Explorer.EXE 32 PID 1344 wrote to memory of 2704 1344 Explorer.EXE 32 PID 1344 wrote to memory of 2704 1344 Explorer.EXE 32 PID 1344 wrote to memory of 2704 1344 Explorer.EXE 32 PID 2704 wrote to memory of 2532 2704 cmmon32.exe 33 PID 2704 wrote to memory of 2532 2704 cmmon32.exe 33 PID 2704 wrote to memory of 2532 2704 cmmon32.exe 33 PID 2704 wrote to memory of 2532 2704 cmmon32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\OVERDUE INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\OVERDUE INVOICE.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\OVERDUE INVOICE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2836
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-