Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
My order pdf.exe
Resource
win7-20241023-en
General
-
Target
My order pdf.exe
-
Size
973KB
-
MD5
80c0e20bcbc0a9a1fe14fd381cbf2d18
-
SHA1
e5024ce6f861d605cc36aa732146d10b163c4340
-
SHA256
5ce5432b57df502d836094e69081a43011e6d62c3ea019c0943e7c305a17d059
-
SHA512
7bc014ac086f7147a831b0c887dae5485b31d4fe1e8341949b4364f8b1df2eedb14c0cf8749b59cd8e8802953f12f292efe2e02e5dc5b34e55d19ad8ae56b2b3
-
SSDEEP
12288:AtxaV1ki3Ir3TOAWg9ojA5xnLpdtLSCfC/wYB+aTY3gg+/SzS3O1r5:AtIVui3IrjIg9ojA5xnpkhRTDg+8
Malware Config
Extracted
formbook
4.1
o85a
lvmh.store
grantrec.online
pinkglam.net
springreno.com
moneynappress.com
disclegends.net
taizonee9.app
3365826.com
asdmohs19.website
atlantapolicy.com
rioinvestmentrd.com
alltriciashomemadegoodies.com
duanvidentcenter.com
whitelabelcasino.xyz
uptick.business
kickverseblade.store
malmotairi.com
nazhan.site
nehimiah.world
aero-bell.com
pertinhodevoce.com
haohaiyq.com
99012305.com
matsukihira-arte.com
reviviobizzo.xyz
lexindx.com
yongalcxa.digital
starair.co
foreveryoungforever.com
caktreecapital.com
1stecfed-assist.com
americascoolest.com
febmakl.online
exclusivewebmasters.com
tamplariedanielnica.net
housz.net
hailisoft.net
sentec-usa.com
faithhopelovejoy.com
yonjia.net
telepathymachine.com
hhsm.net
cleanubble.co.uk
hualong5000.com
cs4a.net
battlegroundsesportsindia.com
roymunene.com
thesilverserpent.co.uk
expertchatter.com
meexnetwork.com
watch-episodes.site
wilxzter.space
palma-mallorca.email
advmedialpt.com
yhlzj.com
restaurantecasa.net
envisiongraphx.online
atlassian.website
fesf.net
womenvibrators.com
klantings002.sbs
slpsmv.xyz
bong79.asia
goodchoose.space
hocseohanoi.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2764-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2764-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/536-28-0x0000000000120000-0x000000000014F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2036 set thread context of 2764 2036 My order pdf.exe 31 PID 2764 set thread context of 1184 2764 RegSvcs.exe 21 PID 536 set thread context of 1184 536 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language My order pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2764 RegSvcs.exe 2764 RegSvcs.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2764 RegSvcs.exe 2764 RegSvcs.exe 2764 RegSvcs.exe 536 rundll32.exe 536 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2764 RegSvcs.exe Token: SeDebugPrivilege 536 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 2036 wrote to memory of 2764 2036 My order pdf.exe 31 PID 1184 wrote to memory of 536 1184 Explorer.EXE 32 PID 1184 wrote to memory of 536 1184 Explorer.EXE 32 PID 1184 wrote to memory of 536 1184 Explorer.EXE 32 PID 1184 wrote to memory of 536 1184 Explorer.EXE 32 PID 1184 wrote to memory of 536 1184 Explorer.EXE 32 PID 1184 wrote to memory of 536 1184 Explorer.EXE 32 PID 1184 wrote to memory of 536 1184 Explorer.EXE 32 PID 536 wrote to memory of 2924 536 rundll32.exe 33 PID 536 wrote to memory of 2924 536 rundll32.exe 33 PID 536 wrote to memory of 2924 536 rundll32.exe 33 PID 536 wrote to memory of 2924 536 rundll32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\My order pdf.exe"C:\Users\Admin\AppData\Local\Temp\My order pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-