Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
Nov objednvka pdf 4562021xxxx.exe
Resource
win7-20240903-en
General
-
Target
Nov objednvka pdf 4562021xxxx.exe
-
Size
939KB
-
MD5
6f3359516e6e034597b9a849a74c0e1b
-
SHA1
2a9117841a02da3ff3bbc119098c401cef5eb462
-
SHA256
501c9c6198b9d45adb224cddd57019dc2ec371e6b65b5522ea7e8b21dfda3255
-
SHA512
98b4ceee4148801b4a503d2a753749c14413a396df85820ea777658f94241e9dbe8fecdca5611410e8f8f622597b17148d7f732d1f4efc5bdda2415b5eb0f9a1
-
SSDEEP
24576:spzSrj/5tafURhnXamgGeQx6UFfX0RbiKboM:spzSrj/7afS1amgidFfk550M
Malware Config
Extracted
formbook
4.1
mynd
bbluedot3dwdbuy.com
aucworks.com
seekselflove.com
thebrandolphcollection.com
saint-daniel.info
covidtestcharleston.com
buniy.com
welprosol.com
focusedbusinesspartners.com
ichikawa.ltd
nieght.com
beediecandleco.com
gracobby.com
nowipe.club
meherconsultancy.com
didonghanquocxachtay.online
snovythailand.com
onetimecreditscore.net
hayosiapa.com
dumpstersforsellers.com
kopfimtopf.com
churchofmanifestation.com
scoopeer.com
givrees.com
giftmystyle.com
enovadis.com
blackcreativeslab.com
juamd.com
yaktaichicks.com
tamquin.net
themaskedstitcher.com
puresed.com
magadir.com
hiptopip.com
surgicalcaseoa.com
yanrk-ht586c.com
online-us.online
salonsuitesofcharleston.com
treeremovalcocoa.com
thewhiskeydisco.com
speaknativechinese.com
e-nokutan.com
mantra613.com
flatrenovation.site
servingdivisiion.com
jemimabdebrito.com
patrington-healthandfitness.com
pandemiyardimbildirim-tr.com
espejitia.com
natasciaedera.com
allcostpk.com
r10288.com
sabzi.uk
astitchinthyme.com
uniq-logistic.online
refreshingtherapy.com
pppdebtrisk.com
jejucash.net
ftfss.com
saintesproe.com
zfcarwholesalers.com
raben-p.site
sundaymorning.media
gatezless.com
dtcu0ng.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4200-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4200-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Nov objednvka pdf 4562021xxxx.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2956 set thread context of 4200 2956 Nov objednvka pdf 4562021xxxx.exe 101 PID 4200 set thread context of 3396 4200 RegSvcs.exe 56 PID 4768 set thread context of 3396 4768 wlanext.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nov objednvka pdf 4562021xxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2956 Nov objednvka pdf 4562021xxxx.exe 4200 RegSvcs.exe 4200 RegSvcs.exe 4200 RegSvcs.exe 4200 RegSvcs.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe 4768 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4200 RegSvcs.exe 4200 RegSvcs.exe 4200 RegSvcs.exe 4768 wlanext.exe 4768 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2956 Nov objednvka pdf 4562021xxxx.exe Token: SeDebugPrivilege 4200 RegSvcs.exe Token: SeDebugPrivilege 4768 wlanext.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3396 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4844 2956 Nov objednvka pdf 4562021xxxx.exe 99 PID 2956 wrote to memory of 4844 2956 Nov objednvka pdf 4562021xxxx.exe 99 PID 2956 wrote to memory of 4844 2956 Nov objednvka pdf 4562021xxxx.exe 99 PID 2956 wrote to memory of 4200 2956 Nov objednvka pdf 4562021xxxx.exe 101 PID 2956 wrote to memory of 4200 2956 Nov objednvka pdf 4562021xxxx.exe 101 PID 2956 wrote to memory of 4200 2956 Nov objednvka pdf 4562021xxxx.exe 101 PID 2956 wrote to memory of 4200 2956 Nov objednvka pdf 4562021xxxx.exe 101 PID 2956 wrote to memory of 4200 2956 Nov objednvka pdf 4562021xxxx.exe 101 PID 2956 wrote to memory of 4200 2956 Nov objednvka pdf 4562021xxxx.exe 101 PID 3396 wrote to memory of 4768 3396 Explorer.EXE 102 PID 3396 wrote to memory of 4768 3396 Explorer.EXE 102 PID 3396 wrote to memory of 4768 3396 Explorer.EXE 102 PID 4768 wrote to memory of 1036 4768 wlanext.exe 103 PID 4768 wrote to memory of 1036 4768 wlanext.exe 103 PID 4768 wrote to memory of 1036 4768 wlanext.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Nov objednvka pdf 4562021xxxx.exe"C:\Users\Admin\AppData\Local\Temp\Nov objednvka pdf 4562021xxxx.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IgdWfn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp79FD.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec521ce3d54a963a9ebe2162373f73a
SHA1c620cc8199e0413a3fa91ca2ba9b099842072b59
SHA25638602c7523baefb3fa90fb9387426f9cf93c09d0289b2afab4af74498014b9af
SHA512b2a7ed38149f543279572895c8b9136d4cb6c18727af896707a92597865d6e21897d859033ea8f64d42827887670ba872cfab20f41e91df51fc2ddd682cdc2f2