Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 07:29

General

  • Target

    ORDERN.F-1676.23.bat.exe

  • Size

    851KB

  • MD5

    358b29dc083fc85dad2d7fc5d37ac767

  • SHA1

    862f8241df559ae7607e5900dae86bee454bea9a

  • SHA256

    ea0d7f34cfddec8c57ddf23bfc5eab2c1692f1b3f5e8fdd6f4f7f8596e478d9d

  • SHA512

    ae9667504f70aef95dd9708ae8e2bbfc789cd0fff64bed6608433f48edfba193889e72decc0385d9875f16287e1feec4717c52a97510575ca1d0556410e1d0d5

  • SSDEEP

    12288:DrQzRa4+sxyjG9IzKjlauWV/dSw1nMks/jsexFacI5u0tnUoOiUQkxcwiKhtC:DmaSxjyOj9WVgMMO+ZIAdV

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cu29

Decoy

qidr.shop

usinessaviationconsulting.net

68716329.xyz

nd-los.net

ealthironcladguarantee.shop

oftware-download-69354.bond

48372305.top

omeownershub.top

mall-chilli.top

ajakgoid.online

ire-changer-53482.bond

rugsrx.shop

oyang123.info

azino-forum-pro.online

817715.rest

layman.vip

eb777.club

ovatonica.net

urgaslotvip.website

inn-paaaa.buzz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\ORDERN.F-1676.23.bat.exe
        "C:\Users\Admin\AppData\Local\Temp\ORDERN.F-1676.23.bat.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ORDERN.F-1676.23.bat.exe"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2728
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\SysWOW64\msdt.exe
            "C:\Windows\SysWOW64\msdt.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1184-19-0x0000000003B40000-0x0000000003C40000-memory.dmp

      Filesize

      1024KB

    • memory/1184-25-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1956-6-0x0000000074940000-0x000000007502E000-memory.dmp

      Filesize

      6.9MB

    • memory/1956-3-0x00000000021F0000-0x00000000022A6000-memory.dmp

      Filesize

      728KB

    • memory/1956-4-0x0000000000280000-0x0000000000292000-memory.dmp

      Filesize

      72KB

    • memory/1956-5-0x000000007494E000-0x000000007494F000-memory.dmp

      Filesize

      4KB

    • memory/1956-2-0x0000000074940000-0x000000007502E000-memory.dmp

      Filesize

      6.9MB

    • memory/1956-7-0x0000000005430000-0x00000000054A6000-memory.dmp

      Filesize

      472KB

    • memory/1956-1-0x0000000000810000-0x00000000008EA000-memory.dmp

      Filesize

      872KB

    • memory/1956-0-0x000000007494E000-0x000000007494F000-memory.dmp

      Filesize

      4KB

    • memory/1956-16-0x0000000074940000-0x000000007502E000-memory.dmp

      Filesize

      6.9MB

    • memory/2592-24-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2592-23-0x00000000001D0000-0x00000000002C4000-memory.dmp

      Filesize

      976KB

    • memory/2720-12-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2720-18-0x0000000000930000-0x0000000000C33000-memory.dmp

      Filesize

      3.0MB

    • memory/2720-20-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2720-22-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2720-10-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2720-13-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2720-8-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB