Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
GenesisRMSPrivateLimitedNovember2024pdf.exe
Resource
win7-20240903-en
General
-
Target
GenesisRMSPrivateLimitedNovember2024pdf.exe
-
Size
1.0MB
-
MD5
a03815195e40a8caf9e0da80eccb9240
-
SHA1
f770dbb9f49ad2f03955a2c5a8c70373652d2ba9
-
SHA256
1477618f7a47c1e6cef99ff4626f541de642a01ec9219290d3a92546abc21c9e
-
SHA512
d62156ed630fee3830832151f42adc6f9ae9fbc48497cf3a54a70759121a583168bf60db85ae50d3964183a72eacd1eea4c187b82c2ba2a67cee675332fa997f
-
SSDEEP
24576:fAHnh+eWsN3skA4RV1Hom2KXMmHaCH6m3kVjM4615:Ch+ZkldoPK8YaC53kZY
Malware Config
Extracted
formbook
4.1
ma28
orth.monster
5970.pizza
oinayangi.net
usiness-funding-48965.bond
uttere.buzz
raumainformed.xyz
amewith.today
hetangosalon.net
irewoodprice168.shop
commerce-96305.bond
3107.loan
uohan.tech
agakaw.website
fricaduka.store
ecga.info
arehouse-inventory-27582.bond
itchen-design-87997.bond
eishahousesteaksushi.shop
liopew.xyz
4769.pizza
111337tz1.shop
6bwp.info
edlinecolorado.net
trewzxvbnm.online
hemebox.info
ajinismusdoktorankara.online
iralcity.store
aitbus.net
w05.lat
ruck-driver-jobs-16575.bond
nline-advertising-48679.bond
ryptocurrency-22237.bond
epression-test-52238.bond
otellatour.online
leaningsuppliesorganizer.shop
ardinenchante.online
larheit.xyz
elmondo.xyz
xj121529q.vip
nfluencer-marketing-83144.bond
olconsulting.xyz
nah.lat
etking.photos
dadlkj.online
indows-66239.bond
loverhoodie.shop
rkaos.xyz
afikotakediri.store
iaokoa.net
aahoma-alex1.rest
revenzionefiscale.info
itchen-design-56744.bond
ueijodeminasoriginal.shop
reast-cancer-symtoms-loft.world
iddyspiderish.life
execution.pro
vjoami3.xyz
4fe5i.xyz
om-exchange-nft55729.sbs
hgevb.info
isc8ito.xyz
ursuitbegins.forum
louddistribution.net
odgerlazerhats.net
9-club.store
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5096-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5096-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5096-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3068-19-0x0000000000300000-0x000000000032F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
GenesisRMSPrivateLimitedNovember2024pdf.exesvchost.exewscript.exedescription pid Process procid_target PID 3552 set thread context of 5096 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 83 PID 5096 set thread context of 3420 5096 svchost.exe 56 PID 5096 set thread context of 3420 5096 svchost.exe 56 PID 3068 set thread context of 3420 3068 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wscript.execmd.exeGenesisRMSPrivateLimitedNovember2024pdf.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GenesisRMSPrivateLimitedNovember2024pdf.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
svchost.exewscript.exepid Process 5096 svchost.exe 5096 svchost.exe 5096 svchost.exe 5096 svchost.exe 5096 svchost.exe 5096 svchost.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
GenesisRMSPrivateLimitedNovember2024pdf.exesvchost.exewscript.exepid Process 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 5096 svchost.exe 5096 svchost.exe 5096 svchost.exe 5096 svchost.exe 3068 wscript.exe 3068 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exewscript.exedescription pid Process Token: SeDebugPrivilege 5096 svchost.exe Token: SeDebugPrivilege 3068 wscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
GenesisRMSPrivateLimitedNovember2024pdf.exepid Process 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
GenesisRMSPrivateLimitedNovember2024pdf.exepid Process 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
GenesisRMSPrivateLimitedNovember2024pdf.exeExplorer.EXEwscript.exedescription pid Process procid_target PID 3552 wrote to memory of 5096 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 83 PID 3552 wrote to memory of 5096 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 83 PID 3552 wrote to memory of 5096 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 83 PID 3552 wrote to memory of 5096 3552 GenesisRMSPrivateLimitedNovember2024pdf.exe 83 PID 3420 wrote to memory of 3068 3420 Explorer.EXE 95 PID 3420 wrote to memory of 3068 3420 Explorer.EXE 95 PID 3420 wrote to memory of 3068 3420 Explorer.EXE 95 PID 3068 wrote to memory of 5020 3068 wscript.exe 100 PID 3068 wrote to memory of 5020 3068 wscript.exe 100 PID 3068 wrote to memory of 5020 3068 wscript.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\GenesisRMSPrivateLimitedNovember2024pdf.exe"C:\Users\Admin\AppData\Local\Temp\GenesisRMSPrivateLimitedNovember2024pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\GenesisRMSPrivateLimitedNovember2024pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4632
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3596
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3856
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2928
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1412
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-