Overview
overview
10Static
static
319979.exe
windows7-x64
1019979.exe
windows10-2004-x64
10Factura_855.pdf.exe
windows7-x64
10Factura_855.pdf.exe
windows10-2004-x64
7qfmjhb.exe
windows7-x64
3qfmjhb.exe
windows10-2004-x64
3Fattura_855.pdf.exe
windows7-x64
10Fattura_855.pdf.exe
windows10-2004-x64
7gocbcx.exe
windows7-x64
3gocbcx.exe
windows10-2004-x64
3IoC/MIL000...0.xlsm
windows7-x64
3IoC/MIL000...0.xlsm
windows10-2004-x64
1IoC/PO.xlsx
windows7-x64
8IoC/PO.xlsx
windows10-2004-x64
1PO_2022-04-33981.exe
windows7-x64
3PO_2022-04-33981.exe
windows10-2004-x64
10IoC/Pagamento.xlsx
windows7-x64
8IoC/Pagamento.xlsx
windows10-2004-x64
1IoC/SHIPPI...TS.rtf
windows7-x64
8IoC/SHIPPI...TS.rtf
windows10-2004-x64
3SMK_29082022.exe
windows7-x64
10SMK_29082022.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
19979.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19979.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Factura_855.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Factura_855.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
qfmjhb.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
qfmjhb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Fattura_855.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Fattura_855.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
gocbcx.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
gocbcx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
IoC/MIL0000640730.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
IoC/MIL0000640730.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
IoC/PO.xlsx
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
IoC/PO.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
PO_2022-04-33981.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
PO_2022-04-33981.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
IoC/Pagamento.xlsx
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
IoC/Pagamento.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
IoC/SHIPPING DOCUMENTS.rtf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
IoC/SHIPPING DOCUMENTS.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
SMK_29082022.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
SMK_29082022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
Fattura_855.pdf.exe
-
Size
240KB
-
MD5
068b6fd352736535c7d967673914c66a
-
SHA1
ae5b7ac0e73123f5b2b31e9a3b1061c9985e70bf
-
SHA256
df52a26061f50bed16f94038cfedb42e1b492b9ce865daabd7ce15db4db9b8a3
-
SHA512
0b3eff80a6cba89895c554206bb64246bc090a04015eae579e9624f71a72e750fa0d9c352f1922731698223444b1b583c3aa075fc67fb00c32f6fe19b8bb585f
-
SSDEEP
6144:HNeZm//7la+u61CkduDVUWurQZt1czVpwS:HNl/zlnNCyAUW1KgS
Malware Config
Extracted
formbook
4.1
m0r9
neekoluldao.com
pandolam.com
homestore.website
inthemoart.com
plubmingcny.com
tsandjsdjproductions.com
bangkok-bars.com
theroganexperience.com
cisneros.media
cxaerfa.xyz
dalafea.online
eppsallen.com
kksm1.com
navega.site
coloradonews.info
rnhues3j.xyz
languageslibrary.com
metapharmacyphuket.net
invisiblelady.com
suculentaycactaceo3d.com
pupilo.xyz
daccake.com
lastgayconservative.com
enspireideas.com
marysaysmeh.com
socialconsultant.xyz
evansapartmentsinlagrangega.com
drillernewsupdate.com
myvegan.restaurant
voyagewithscottmonty.com
openproductize.club
cinemagicmovie.com
nftunick.com
velabonita.com
email-testingmavens.net
xiaoshuhao.com
cryptosong.xyz
coloradocompetition.com
composite.international
carrinhourbano.com
answer2017.com
xucug.com
toursmargaretriver.global
amicuscare.life
mpqbridalshowcase.com
loversondisplay.com
julie-agency.com
icloud-xn1.site
yofing.site
biygi.com
midiaestetic.com
mwykmm.icu
digitalprojects.site
dagreats.com
myhapocun.xyz
beritasejagat.com
37c24a3158dc6f1a.com
croninstarlight.com
wu6bqyjf7tvzs.xyz
catjo6.mobi
paarl.xyz
platinumoffres.store
letreensemble.com
shaatshop.com
greensborotattoo.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral7/memory/2536-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral7/memory/2536-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral7/memory/2536-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral7/memory/2296-28-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
gocbcx.exegocbcx.exepid process 2084 gocbcx.exe 2536 gocbcx.exe -
Loads dropped DLL 3 IoCs
Processes:
Fattura_855.pdf.exegocbcx.exepid process 2348 Fattura_855.pdf.exe 2348 Fattura_855.pdf.exe 2084 gocbcx.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
gocbcx.exegocbcx.exehelp.exedescription pid process target process PID 2084 set thread context of 2536 2084 gocbcx.exe gocbcx.exe PID 2536 set thread context of 1148 2536 gocbcx.exe Explorer.EXE PID 2536 set thread context of 1148 2536 gocbcx.exe Explorer.EXE PID 2296 set thread context of 1148 2296 help.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Fattura_855.pdf.exegocbcx.exehelp.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fattura_855.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gocbcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
gocbcx.exehelp.exepid process 2536 gocbcx.exe 2536 gocbcx.exe 2536 gocbcx.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe 2296 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
gocbcx.exehelp.exepid process 2536 gocbcx.exe 2536 gocbcx.exe 2536 gocbcx.exe 2536 gocbcx.exe 2296 help.exe 2296 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
gocbcx.exehelp.exedescription pid process Token: SeDebugPrivilege 2536 gocbcx.exe Token: SeDebugPrivilege 2296 help.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Fattura_855.pdf.exegocbcx.exeExplorer.EXEhelp.exedescription pid process target process PID 2348 wrote to memory of 2084 2348 Fattura_855.pdf.exe gocbcx.exe PID 2348 wrote to memory of 2084 2348 Fattura_855.pdf.exe gocbcx.exe PID 2348 wrote to memory of 2084 2348 Fattura_855.pdf.exe gocbcx.exe PID 2348 wrote to memory of 2084 2348 Fattura_855.pdf.exe gocbcx.exe PID 2084 wrote to memory of 2536 2084 gocbcx.exe gocbcx.exe PID 2084 wrote to memory of 2536 2084 gocbcx.exe gocbcx.exe PID 2084 wrote to memory of 2536 2084 gocbcx.exe gocbcx.exe PID 2084 wrote to memory of 2536 2084 gocbcx.exe gocbcx.exe PID 2084 wrote to memory of 2536 2084 gocbcx.exe gocbcx.exe PID 2084 wrote to memory of 2536 2084 gocbcx.exe gocbcx.exe PID 2084 wrote to memory of 2536 2084 gocbcx.exe gocbcx.exe PID 1148 wrote to memory of 2296 1148 Explorer.EXE help.exe PID 1148 wrote to memory of 2296 1148 Explorer.EXE help.exe PID 1148 wrote to memory of 2296 1148 Explorer.EXE help.exe PID 1148 wrote to memory of 2296 1148 Explorer.EXE help.exe PID 2296 wrote to memory of 2980 2296 help.exe cmd.exe PID 2296 wrote to memory of 2980 2296 help.exe cmd.exe PID 2296 wrote to memory of 2980 2296 help.exe cmd.exe PID 2296 wrote to memory of 2980 2296 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Fattura_855.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Fattura_855.pdf.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\gocbcx.exeC:\Users\Admin\AppData\Local\Temp\gocbcx.exe C:\Users\Admin\AppData\Local\Temp\rnukeqm3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\gocbcx.exeC:\Users\Admin\AppData\Local\Temp\gocbcx.exe C:\Users\Admin\AppData\Local\Temp\rnukeqm4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1972
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\gocbcx.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD56c310e309e2ddfe8ae53e95c525c9e52
SHA1694861bf8fbddafc5673853c8f7c910a2b60a1b7
SHA256ffef20b2c9b8d9cdd4f471718ef688a8bd4834b6481978574b877ab14a91228d
SHA5128030a4b7d8d225699d4c9d71cf015dbb90895266e9006c5fee1ba9ce56ac871f1f9477ee4ccf6c62109ef23f0321d9590a3b286156d5b57e30bbe2f9d302a931
-
Filesize
184KB
MD502475297a79138c050381b19f13cbb88
SHA1efeb9032605484fdea6478b224afe59af46f29a3
SHA256a3439fba9220dbfe1fb05f3dfa24aab3e7f72071ff1f16bae20fd58c227e4b7a
SHA51235e9e844e33c1ac1ad3ce9e035ba2ff6302e84941bcd300011c758fa6eb917292a2db480a3d1592e6a275b84621708b08109579599781c2fd28fdba8f7e25d55
-
Filesize
5KB
MD58d73805cc88e7c5fb975ea51d44509c0
SHA17b3615aeb8d8a6a049dd59d2c6883c2d60c689b8
SHA25683bd692b6115ceeb84745dac471dc333377ce29178894d0493e0d2a6acd975b4
SHA512e50598247e565bb3d509189c107f288ee07d163913d38a2e9ebf2f5bdaed969c49c027c96e0afab8a00cefc2c4cf4e712d99b853a2b3af36694ff1784b75dff3