Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
MAERSK Tracking Document.scr
Resource
win7-20241010-en
General
-
Target
MAERSK Tracking Document.scr
-
Size
924KB
-
MD5
3a8f82508c711f924c54faa42d31a59a
-
SHA1
b97dc139f2d5027e74f03b1ef9e0949a83d62c54
-
SHA256
54bd1e36470a85b388bf211308b661eb8f6cf52300ed006a8adaa3d9d087cf9d
-
SHA512
288aa5b52e6082c383385003b806bf75d9ef17990b3fc6acb5cac5e20710b4a0125729d556a907336269c778fc5bd283c2b2d606230f4729f1515be2d5e69545
-
SSDEEP
12288:AiB4sLf+BvqbT+ZJjHKqrKdLazzSYCUZRFRrKdFP55FW/Bw8ytA7RATi+esTCmf:AiB4PlFJWqQLkJezjyBjytA7S2mf
Malware Config
Extracted
formbook
3.9
chu20
bringingenglewoodtogether.com
corrisneaker.com
findthesellers.info
118isp.com
vrsconcrete.com
tv-format.com
zs-chuangjian.com
karolczyk.online
amacproducts.com
paraisoboipeba.com
eracto.site
secretgardenrsf.com
village-realty.com
penlogos.com
godhasthe.solutions
dow.care
loadgid2sd.com
viewfromthedocs.com
abobo.site
blacksungroupinternational.com
bamalai.com
bladesnscissors.com
oldskul.net
valerysolar.win
nk4ji.com
almozejej.com
safetyfirstpoolinspections.com
ameli-assurancemaladie.com
470cb.com
keysurgicol.com
bookofyardage.com
movies.agency
hyper-greenpeace.com
ja-cctv.com
littlegemsblog.com
sanan-group.com
iphone7me.cricket
xmrs.ltd
530manx.com
liqvos.ink
kursprzekladu.com
korat-property.com
dissenypaginaweb.net
9p9602r3o3.com
alegoryparis.com
casinodetektiven.com
huake666.com
hadleydesignstudio.net
congersfamilydentistry.com
marielanart.com
158rentals.com
handbagtrade.info
devettevark.com
enlasbibliotecas.com
slideomatic.com
sitedohomem.site
trivagocoin.com
cisma-web.com
mayahollander.com
interiorssupply.com
faceboxxl.com
conciergeactivities.com
xn--prf-dein-urteil-0vb.online
renaissancesb.com
importradee.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2952-24-0x0000000003540000-0x0000000003640000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2696 cmd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MAERSK Tracking Document.scrdescription ioc Process File opened for modification \??\PhysicalDrive0 MAERSK Tracking Document.scr -
Suspicious use of SetThreadContext 2 IoCs
Processes:
MAERSK Tracking Document.scrsystray.exedescription pid Process procid_target PID 2952 set thread context of 1188 2952 MAERSK Tracking Document.scr 21 PID 2652 set thread context of 1188 2652 systray.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MAERSK Tracking Document.scrsystray.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAERSK Tracking Document.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
MAERSK Tracking Document.scrsystray.exepid Process 2952 MAERSK Tracking Document.scr 2952 MAERSK Tracking Document.scr 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe 2652 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
MAERSK Tracking Document.scrsystray.exepid Process 2952 MAERSK Tracking Document.scr 2952 MAERSK Tracking Document.scr 2952 MAERSK Tracking Document.scr 2652 systray.exe 2652 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MAERSK Tracking Document.scrsystray.exedescription pid Process Token: SeDebugPrivilege 2952 MAERSK Tracking Document.scr Token: SeDebugPrivilege 2652 systray.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Explorer.EXEsystray.exedescription pid Process procid_target PID 1188 wrote to memory of 2652 1188 Explorer.EXE 30 PID 1188 wrote to memory of 2652 1188 Explorer.EXE 30 PID 1188 wrote to memory of 2652 1188 Explorer.EXE 30 PID 1188 wrote to memory of 2652 1188 Explorer.EXE 30 PID 2652 wrote to memory of 2696 2652 systray.exe 31 PID 2652 wrote to memory of 2696 2652 systray.exe 31 PID 2652 wrote to memory of 2696 2652 systray.exe 31 PID 2652 wrote to memory of 2696 2652 systray.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr"C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr" /S2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2696
-
-