Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
neue Ordnung.exe
Resource
win7-20241023-en
General
-
Target
neue Ordnung.exe
-
Size
739KB
-
MD5
b8a6bff0de26505a8671135a34c21ff9
-
SHA1
3da946ce135ebc855d27681a9baffb8204013ab7
-
SHA256
ca928ee1114c01bf51f11b5200d0da9a823cd35cc4e616ddd3f44ddd3f3fcb56
-
SHA512
9804648531b9bb9d9e4d3632b0f43dfd5fd5423a12571376900b7801a2b0f0e20be5bbef04ec76d59139f9a1df7dd162d784f63a4caea82746768d25578cbc13
-
SSDEEP
12288:GtTk4E9YztD96v+vANmnhWvGY6sAL3+GHUKlbCOA0HK7znhyDBljJhqPTqCkUCM5:yYMhWjAryOWlyDJhqPTqXUg2JciMvo+k
Malware Config
Extracted
formbook
4.1
odse
braedlifestyle.com
morganjohnsondesign.online
surup-v48.club
diypoolpaint.sydney
v-b7026-ghhh.space
vetyvar.com
lollydaisy.com
campsitesurvival.com
autocalibre.com
fusiontech3d.com
xn--udkog0cvez259c82sa.xyz
eccentricartist.com
jc-zg.com
wacwin.com
livehealthychoice.com
visijuara.com
phigsa.com
sabayawork.com
afcerd.com
joeyshousesessions.com
fancycn.com
fem-iam.com
sinopocasles.com
skypalaceportal.com
wqajecjeias.com
selfscienceslabs.com
workingtitle.agency
asianartsawards.com
healtyhouse.com
iloveme.life
espacioleiva.com
dac71047.com
soldbygenajohnson.com
motherhenscoop.com
polkadotcoins.com
muslimmediation.com
grub-groove.com
albertaeatsfood.com
mixedplaylists.com
miamimotorcycleshop.com
unegublog.com
generalssoccer.com
manhattanlandscapedesign.com
cuongnguyen3r2j.com
stonelodgeseniorliving.com
swissinternationaltrustb.com
novemento.club
bladesmts.com
espiaruncelular.net
talasoglufinans.com
sargeworld.com
newlifenowblog.com
sugaringpalms.com
xaoikevesesede.com
mintyline.com
paleonade.com
saharsaghi.com
kentchimney.com
whipitgudd.com
gmopst.com
likekopi.com
spoonproductions-catering.com
annotake.com
stm32heaven.com
guncelekspres.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2700-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2700-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2360 set thread context of 2700 2360 neue Ordnung.exe 33 PID 2700 set thread context of 1212 2700 RegSvcs.exe 21 PID 2948 set thread context of 1212 2948 explorer.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neue Ordnung.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2360 neue Ordnung.exe 2700 RegSvcs.exe 2700 RegSvcs.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2700 RegSvcs.exe 2700 RegSvcs.exe 2700 RegSvcs.exe 2948 explorer.exe 2948 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2360 neue Ordnung.exe Token: SeDebugPrivilege 2700 RegSvcs.exe Token: SeDebugPrivilege 2948 explorer.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2932 2360 neue Ordnung.exe 31 PID 2360 wrote to memory of 2932 2360 neue Ordnung.exe 31 PID 2360 wrote to memory of 2932 2360 neue Ordnung.exe 31 PID 2360 wrote to memory of 2932 2360 neue Ordnung.exe 31 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 2360 wrote to memory of 2700 2360 neue Ordnung.exe 33 PID 1212 wrote to memory of 2948 1212 Explorer.EXE 34 PID 1212 wrote to memory of 2948 1212 Explorer.EXE 34 PID 1212 wrote to memory of 2948 1212 Explorer.EXE 34 PID 1212 wrote to memory of 2948 1212 Explorer.EXE 34 PID 2948 wrote to memory of 2704 2948 explorer.exe 35 PID 2948 wrote to memory of 2704 2948 explorer.exe 35 PID 2948 wrote to memory of 2704 2948 explorer.exe 35 PID 2948 wrote to memory of 2704 2948 explorer.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\neue Ordnung.exe"C:\Users\Admin\AppData\Local\Temp\neue Ordnung.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EUZXfzkehwuA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp73F8.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d230f9c6bd1a70fbe23885df198747b1
SHA1b7f13d112c10e537fd7daa6fd7410c40eadfe8eb
SHA2561117108e7eab1fdab5c69667fbb49e5528925a16fa5a16ea1451966f3870a984
SHA5129f4a8afa024557a413e41c00b9ebad2254f4f93e4d2101126994736682d76ce2b76cf1c0e7f401da32e727a4016fbb61b86da2441b27307ef42efc2d1d927841