Analysis
-
max time kernel
149s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
Invoice NO 22073895.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Invoice NO 22073895.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pvwuec.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
pvwuec.exe
Resource
win10v2004-20241007-en
General
-
Target
Invoice NO 22073895.exe
-
Size
486KB
-
MD5
85cd688a9fee95b88b94b6879039201f
-
SHA1
0843488b993fd26651cff415ac5a43c593defa25
-
SHA256
4d3261b30e45d9577916b421a9b829836e955a9be539866aa29d21aad01283c1
-
SHA512
9ed65a00f4e6c276b18778feac6140759ebbc159d15c4c20280ff13b1887c73ec4fc88a38abe0f8e0d75ec0e5a5acf82478472b761247bee1357d130bf80ab45
-
SSDEEP
12288:AYn68Ex+E5Z8kJqeKPMwwOfGo5KNfhtDuCytMi4zaaKL:AYn6DAEgIqecuo5KbsCy6igbG
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/3016-17-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/3016-20-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/3016-23-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/2812-30-0x0000000000080000-0x00000000000AC000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation pvwuec.exe -
Executes dropped EXE 2 IoCs
pid Process 2172 pvwuec.exe 3016 pvwuec.exe -
Loads dropped DLL 3 IoCs
pid Process 2396 Invoice NO 22073895.exe 2396 Invoice NO 22073895.exe 2172 pvwuec.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2172 set thread context of 3016 2172 pvwuec.exe 30 PID 3016 set thread context of 1268 3016 pvwuec.exe 20 PID 3016 set thread context of 1268 3016 pvwuec.exe 20 PID 2812 set thread context of 1268 2812 control.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Invoice NO 22073895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvwuec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3016 pvwuec.exe 3016 pvwuec.exe 3016 pvwuec.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe 2812 control.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2172 pvwuec.exe 3016 pvwuec.exe 3016 pvwuec.exe 3016 pvwuec.exe 3016 pvwuec.exe 2812 control.exe 2812 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3016 pvwuec.exe Token: SeDebugPrivilege 2812 control.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2172 2396 Invoice NO 22073895.exe 29 PID 2396 wrote to memory of 2172 2396 Invoice NO 22073895.exe 29 PID 2396 wrote to memory of 2172 2396 Invoice NO 22073895.exe 29 PID 2396 wrote to memory of 2172 2396 Invoice NO 22073895.exe 29 PID 2172 wrote to memory of 3016 2172 pvwuec.exe 30 PID 2172 wrote to memory of 3016 2172 pvwuec.exe 30 PID 2172 wrote to memory of 3016 2172 pvwuec.exe 30 PID 2172 wrote to memory of 3016 2172 pvwuec.exe 30 PID 2172 wrote to memory of 3016 2172 pvwuec.exe 30 PID 1268 wrote to memory of 2812 1268 Explorer.EXE 31 PID 1268 wrote to memory of 2812 1268 Explorer.EXE 31 PID 1268 wrote to memory of 2812 1268 Explorer.EXE 31 PID 1268 wrote to memory of 2812 1268 Explorer.EXE 31 PID 2812 wrote to memory of 2920 2812 control.exe 32 PID 2812 wrote to memory of 2920 2812 control.exe 32 PID 2812 wrote to memory of 2920 2812 control.exe 32 PID 2812 wrote to memory of 2920 2812 control.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Invoice NO 22073895.exe"C:\Users\Admin\AppData\Local\Temp\Invoice NO 22073895.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\pvwuec.exe"C:\Users\Admin\AppData\Local\Temp\pvwuec.exe" C:\Users\Admin\AppData\Local\Temp\eeelcb.fn3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\pvwuec.exe"C:\Users\Admin\AppData\Local\Temp\pvwuec.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\pvwuec.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c4ee853696ad5db212cd6ae2bb8a0fe1
SHA1840ccd25c091a082be426b35386ce7ab8f5d0631
SHA2566c92c5b0c148c513174215823f3ba3f7f53adbaae077553219826b35553edba1
SHA5127527d4792d58829f38ed4509a37cc248a02aaeeddf747d3afe3c3f380f8fdad0ebe39e9c989bf1d224f54fab0d187379a93eb9a61800fd7d1f52eb4e6ec9e8c3
-
Filesize
196KB
MD5f33a9bba9a07130a2662f4f14e696e7c
SHA16fd979cbec5aaa33f8276ca0825a8c0e71768499
SHA256ea5fe369ca49d659b7cf129def53fd7a1589c9ccdf16a7270354897e885d730c
SHA5128df1c084b2dcf922faa9ae404642ab9e417b50bdafbf88ce14f1df1d3c3894d7e2f23e5e83ac4362edec3aa0d5a898af9087dac3680731a8dc8960a43b33cdfb
-
Filesize
84KB
MD5e87c6c672ec024582ffb00811abf747e
SHA105921c941ed33b6e0e4cd35c20a452d0659d04dd
SHA25617a23dd9b5a1b36f5db90ea4e102a03a8dd14557b60f4c19c17e62e53ac19f86
SHA5125d09656b375b7cb2a3e3062e4a4af3c77663cc454e79a7be59f2996b4db54e8609f6de7b0ad27432e42b45f2e544a22ba43096b61be6d06d36ff1b20b1e49cb5