Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
Payment invoice 549590.exe
Resource
win7-20240729-en
General
-
Target
Payment invoice 549590.exe
-
Size
789KB
-
MD5
b0c0077f9a3dccb680b560ab59f77546
-
SHA1
ec032a6a884117be45db01ff057df7f6628b8f02
-
SHA256
9a7bd97ac102e6f0f5718cc18085ec685ff87b78956f97a2375a8883263beb54
-
SHA512
5cdfaf5c6a942f32c313822a878f970dcd16027c3ba9dbbe4386b4ca5c9c4bb2707c07dd3fd8a0e89602a70a53066c44760bd11964ea88fc690bc82fc59f10c6
-
SSDEEP
24576:ZEhsSrVbCx3YNCU0mP7Y7Vc3Cu5ektpc8+obx:RSlCyHwVz/ktpn+obx
Malware Config
Extracted
formbook
4.1
p25o
hrist-centered-soulcare.net
pacerpa.shop
hicandcurvy.shop
ocfamilyto.llc
9ds87666.men
sia918ku.shop
nvestment-broker-35141.bond
ltralicencas.shop
g1lmb.cyou
eyo.live
pupt.rest
indsetperfection.net
1duqqrzs65zxz.bond
eren138-pro2.click
leaning-products-35959.bond
oodea.online
hlbadienug.info
innivip.bio
funnygame.top
roperty-in-dubai-f.pro
ypdh9.digital
iving-artists.net
inimalkultur.net
estore.club
ensurix.xyz
obs-for-seniors-2507.xyz
anman.shop
rogramacaodozero.tech
rder0295.info
43su111as.autos
ideograms.net
erkalo-leono-tuyf.buzz
ryptotremp.xyz
amionnxuusjj25.sbs
oans-credits-bg-1.bond
rainstumper.info
obility-bed-12073.bond
oom188play.net
veriosg.xyz
fertaspuma.online
golv.info
akingcourse01.today
espie.stream
upa.dad
iriblog.xyz
ampobet-casino.net
ntheeventpc.xyz
88herowin.online
ental-implant-grantss.today
icycles-pl.today
eclan-paaaa.buzz
iyanoegitim.online
dunegocios.pro
mhy35444.sbs
light-ticket-deals-52731.bond
raphic-design-degree-65053.bond
power.services
onstruction-services-85205.bond
eiliao602.pro
izyj.info
p34.top
olar-panel-jobs-14611.bond
ideo-games-73460.bond
ubngonsale5sao.pro
agestore.online
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2108-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2108-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2108-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2336-22-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 932 powershell.exe -
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2368 set thread context of 2108 2368 Payment invoice 549590.exe 32 PID 2108 set thread context of 1252 2108 Payment invoice 549590.exe 21 PID 2108 set thread context of 1252 2108 Payment invoice 549590.exe 21 PID 2336 set thread context of 1252 2336 NETSTAT.EXE 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment invoice 549590.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2336 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2108 Payment invoice 549590.exe 2108 Payment invoice 549590.exe 932 powershell.exe 2108 Payment invoice 549590.exe 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE 2336 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2108 Payment invoice 549590.exe 2108 Payment invoice 549590.exe 2108 Payment invoice 549590.exe 2108 Payment invoice 549590.exe 2336 NETSTAT.EXE 2336 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2108 Payment invoice 549590.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeDebugPrivilege 2336 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2368 wrote to memory of 932 2368 Payment invoice 549590.exe 31 PID 2368 wrote to memory of 932 2368 Payment invoice 549590.exe 31 PID 2368 wrote to memory of 932 2368 Payment invoice 549590.exe 31 PID 2368 wrote to memory of 932 2368 Payment invoice 549590.exe 31 PID 2368 wrote to memory of 2108 2368 Payment invoice 549590.exe 32 PID 2368 wrote to memory of 2108 2368 Payment invoice 549590.exe 32 PID 2368 wrote to memory of 2108 2368 Payment invoice 549590.exe 32 PID 2368 wrote to memory of 2108 2368 Payment invoice 549590.exe 32 PID 2368 wrote to memory of 2108 2368 Payment invoice 549590.exe 32 PID 2368 wrote to memory of 2108 2368 Payment invoice 549590.exe 32 PID 2368 wrote to memory of 2108 2368 Payment invoice 549590.exe 32 PID 1252 wrote to memory of 2336 1252 Explorer.EXE 34 PID 1252 wrote to memory of 2336 1252 Explorer.EXE 34 PID 1252 wrote to memory of 2336 1252 Explorer.EXE 34 PID 1252 wrote to memory of 2336 1252 Explorer.EXE 34 PID 2336 wrote to memory of 2780 2336 NETSTAT.EXE 35 PID 2336 wrote to memory of 2780 2336 NETSTAT.EXE 35 PID 2336 wrote to memory of 2780 2336 NETSTAT.EXE 35 PID 2336 wrote to memory of 2780 2336 NETSTAT.EXE 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\Payment invoice 549590.exe"C:\Users\Admin\AppData\Local\Temp\Payment invoice 549590.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Payment invoice 549590.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\Payment invoice 549590.exe"C:\Users\Admin\AppData\Local\Temp\Payment invoice 549590.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment invoice 549590.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2780
-
-