Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20241010-en
General
-
Target
New order.exe
-
Size
952KB
-
MD5
47a6b60d5e3fc02f322dfe2d81782f58
-
SHA1
36d44911956c67b0a4c403d26759e9ca9a6e956c
-
SHA256
979e6f85bb86ba8f1dc0bbe0770f12b2ec48d329d369f9ba84dd31598e8b3aed
-
SHA512
099d9cc1622f6f2046704e5dfa7441d10d240a741f1278375c8f399d036f95bf70dd314854bbefc4280e50bfade2a0403f28f172f9bbb15c00df38a62b8b2e11
-
SSDEEP
12288:acVScL0nsDT0Q00QEA86GIbYgXMq4Dnk7qX0HqHuCQ77zZFsn58qHXuB:pVYn4mn86TbZSDkXKHuCQ77zZFA58D
Malware Config
Extracted
formbook
4.1
q06e
iibutogel88.life
atumainitx.net
axto1xb.top
iberalparti.xyz
etfury.shop
ainter-job-14480.bond
rhyd82593.vip
yexoiup.xyz
ityreel.page
usiness-ddljxgk.top
eifeigou.top
asl321.dev
eativ.cloud
ollywoodbets.fan
azekage.shop
ojarski.online
ardtaste.net
ltair-bots.online
atncs.top
k8y.info
bookauto.site
reencollectiongrup.online
3001.vip
alancednourish.shop
aliente.furniture
elationship-coach-50004.bond
doglesa.homes
afatogela.live
uu98.top
eal-estate-55232.bond
dtrear.net
588535.vip
b53ojq9.top
efurbico.online
ersawgero.online
mica.store
andor.site
arehouse-inventory-59535.bond
ajaslot88.store
lariphi.app
bookbusiness.shop
mvip7.xyz
foye8.buzz
g8.today
lockchain-life.forum
kyboost.digital
wyza32084.vip
wander.shop
dyd.top
icitaenlinea.digital
ockmybrand.shop
extlan.net
ouches-sofas-93874.bond
hinz.net
sphome.pro
racimp.bond
orus.wiki
all-center-88424.bond
tjia.info
iqnli.top
slpo.link
192222-com00.top
fricanti.online
unce.top
tacr.click
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4924-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4924-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1636-23-0x0000000000110000-0x000000000013E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
New order.exeNew order.exeraserver.exedescription pid Process procid_target PID 2244 set thread context of 4924 2244 New order.exe 98 PID 4924 set thread context of 3536 4924 New order.exe 56 PID 1636 set thread context of 3536 1636 raserver.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
New order.exeraserver.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
New order.exeNew order.exeraserver.exepid Process 2244 New order.exe 2244 New order.exe 2244 New order.exe 2244 New order.exe 2244 New order.exe 2244 New order.exe 4924 New order.exe 4924 New order.exe 4924 New order.exe 4924 New order.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe 1636 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
New order.exeraserver.exepid Process 4924 New order.exe 4924 New order.exe 4924 New order.exe 1636 raserver.exe 1636 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
New order.exeNew order.exeraserver.exedescription pid Process Token: SeDebugPrivilege 2244 New order.exe Token: SeDebugPrivilege 4924 New order.exe Token: SeDebugPrivilege 1636 raserver.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid Process 3536 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
New order.exeExplorer.EXEraserver.exedescription pid Process procid_target PID 2244 wrote to memory of 4924 2244 New order.exe 98 PID 2244 wrote to memory of 4924 2244 New order.exe 98 PID 2244 wrote to memory of 4924 2244 New order.exe 98 PID 2244 wrote to memory of 4924 2244 New order.exe 98 PID 2244 wrote to memory of 4924 2244 New order.exe 98 PID 2244 wrote to memory of 4924 2244 New order.exe 98 PID 3536 wrote to memory of 1636 3536 Explorer.EXE 99 PID 3536 wrote to memory of 1636 3536 Explorer.EXE 99 PID 3536 wrote to memory of 1636 3536 Explorer.EXE 99 PID 1636 wrote to memory of 1576 1636 raserver.exe 100 PID 1636 wrote to memory of 1576 1636 raserver.exe 100 PID 1636 wrote to memory of 1576 1636 raserver.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\New order.exe"C:\Users\Admin\AppData\Local\Temp\New order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\New order.exe"C:\Users\Admin\AppData\Local\Temp\New order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-