Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order KEI_24-25_2014_pdf.exe
Resource
win7-20240903-en
General
-
Target
Purchase Order KEI_24-25_2014_pdf.exe
-
Size
636KB
-
MD5
db540008406cdfda78d7376355137f07
-
SHA1
67ba297c80a80f17ec891c0429b59f30527724d9
-
SHA256
57faa8a932b14577e6059332889866501a93e2b9552dd81dcb79a047254be749
-
SHA512
4fac3ffd2d003f51bb9cc3c97c65486385c54baef4ddb88e6b3db6713f61d86b25879d119cc3f6dca675429bb8b105e7cad07477edc33edc35eb74a01208f79c
-
SSDEEP
12288:zT4/i2fmLZL41rjVZL3ANOZNMMizbXrK47MColgzsDk:zT4q2fmLZM53AQZ/inblwBgI
Malware Config
Extracted
formbook
4.1
btrd
toulouse.gold
launchyouglobal.com
margarita-services.com
dasnail.club
casa-hilo.com
hardscapesofflorida.com
thepositivitypulse.com
kkmyanev.cfd
love6ace22.top
castorcruise.com
chch6.com
h59f07jy.cfd
saatvikteerthyatra.com
fxsecuretrading-option.com
mostbet-k1o.click
36-m.beauty
ko-or-a-news.com
eurekatextile.com
gynlkj.com
deepsouthcraftsman.com
bougiebossbabe.com
202402.xyz
thecareskin.com
zimmerli.online
bathroomconnectsupreme.com
opmk.monster
docemimocasamentos.com
mywayinist.com
healthyters.com
mozartchamberorchestra.sydney
wewillrock.club
education2jobs.com
everlastdisposal.com
valentinascrochet.com
stewartvaluation.net
blackphoenix01.xyz
omnikart.shop
jejeesclothing.com
allurepet.site
futureofaustin.com
sillylittlestory.com
inthewoodsdesigns.com
freshtraining.store
illuminati4me.com
jewishlakecounty.com
devadecoration.com
nashexshop.com
martline.website
affirmationtotebags.com
golifestyles.com
telegood.info
trygenesisx.com
bestwhitetee.com
delicatemayhem.com
redyardcom.com
solarcyborg.com
emotieloos.com
fanatics-international.com
ballonsmagiques.com
projektincognito.com
fcno30.com
horizonoutdoorservices.com
couturewrap.com
mbbwa4wp.cfd
lifeofthobes.uk
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/64-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/64-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1476-24-0x00000000001A0000-0x00000000001CF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2084 set thread context of 64 2084 Purchase Order KEI_24-25_2014_pdf.exe 91 PID 64 set thread context of 3580 64 AddInProcess32.exe 56 PID 1476 set thread context of 3580 1476 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order KEI_24-25_2014_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2084 Purchase Order KEI_24-25_2014_pdf.exe 2084 Purchase Order KEI_24-25_2014_pdf.exe 2084 Purchase Order KEI_24-25_2014_pdf.exe 2084 Purchase Order KEI_24-25_2014_pdf.exe 2084 Purchase Order KEI_24-25_2014_pdf.exe 2084 Purchase Order KEI_24-25_2014_pdf.exe 2084 Purchase Order KEI_24-25_2014_pdf.exe 64 AddInProcess32.exe 64 AddInProcess32.exe 64 AddInProcess32.exe 64 AddInProcess32.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 64 AddInProcess32.exe 64 AddInProcess32.exe 64 AddInProcess32.exe 1476 help.exe 1476 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2084 Purchase Order KEI_24-25_2014_pdf.exe Token: SeDebugPrivilege 64 AddInProcess32.exe Token: SeDebugPrivilege 1476 help.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3064 2084 Purchase Order KEI_24-25_2014_pdf.exe 87 PID 2084 wrote to memory of 3064 2084 Purchase Order KEI_24-25_2014_pdf.exe 87 PID 2084 wrote to memory of 3064 2084 Purchase Order KEI_24-25_2014_pdf.exe 87 PID 2084 wrote to memory of 3064 2084 Purchase Order KEI_24-25_2014_pdf.exe 87 PID 2084 wrote to memory of 3064 2084 Purchase Order KEI_24-25_2014_pdf.exe 87 PID 2084 wrote to memory of 3064 2084 Purchase Order KEI_24-25_2014_pdf.exe 87 PID 2084 wrote to memory of 1756 2084 Purchase Order KEI_24-25_2014_pdf.exe 90 PID 2084 wrote to memory of 1756 2084 Purchase Order KEI_24-25_2014_pdf.exe 90 PID 2084 wrote to memory of 1756 2084 Purchase Order KEI_24-25_2014_pdf.exe 90 PID 2084 wrote to memory of 1756 2084 Purchase Order KEI_24-25_2014_pdf.exe 90 PID 2084 wrote to memory of 1756 2084 Purchase Order KEI_24-25_2014_pdf.exe 90 PID 2084 wrote to memory of 1756 2084 Purchase Order KEI_24-25_2014_pdf.exe 90 PID 2084 wrote to memory of 64 2084 Purchase Order KEI_24-25_2014_pdf.exe 91 PID 2084 wrote to memory of 64 2084 Purchase Order KEI_24-25_2014_pdf.exe 91 PID 2084 wrote to memory of 64 2084 Purchase Order KEI_24-25_2014_pdf.exe 91 PID 2084 wrote to memory of 64 2084 Purchase Order KEI_24-25_2014_pdf.exe 91 PID 2084 wrote to memory of 64 2084 Purchase Order KEI_24-25_2014_pdf.exe 91 PID 2084 wrote to memory of 64 2084 Purchase Order KEI_24-25_2014_pdf.exe 91 PID 3580 wrote to memory of 1476 3580 Explorer.EXE 94 PID 3580 wrote to memory of 1476 3580 Explorer.EXE 94 PID 3580 wrote to memory of 1476 3580 Explorer.EXE 94 PID 1476 wrote to memory of 1408 1476 help.exe 95 PID 1476 wrote to memory of 1408 1476 help.exe 95 PID 1476 wrote to memory of 1408 1476 help.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order KEI_24-25_2014_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order KEI_24-25_2014_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:3064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:1756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1408
-
-