Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
My order pdf.exe
Resource
win7-20241023-en
General
-
Target
My order pdf.exe
-
Size
973KB
-
MD5
80c0e20bcbc0a9a1fe14fd381cbf2d18
-
SHA1
e5024ce6f861d605cc36aa732146d10b163c4340
-
SHA256
5ce5432b57df502d836094e69081a43011e6d62c3ea019c0943e7c305a17d059
-
SHA512
7bc014ac086f7147a831b0c887dae5485b31d4fe1e8341949b4364f8b1df2eedb14c0cf8749b59cd8e8802953f12f292efe2e02e5dc5b34e55d19ad8ae56b2b3
-
SSDEEP
12288:AtxaV1ki3Ir3TOAWg9ojA5xnLpdtLSCfC/wYB+aTY3gg+/SzS3O1r5:AtIVui3IrjIg9ojA5xnpkhRTDg+8
Malware Config
Extracted
formbook
4.1
o85a
lvmh.store
grantrec.online
pinkglam.net
springreno.com
moneynappress.com
disclegends.net
taizonee9.app
3365826.com
asdmohs19.website
atlantapolicy.com
rioinvestmentrd.com
alltriciashomemadegoodies.com
duanvidentcenter.com
whitelabelcasino.xyz
uptick.business
kickverseblade.store
malmotairi.com
nazhan.site
nehimiah.world
aero-bell.com
pertinhodevoce.com
haohaiyq.com
99012305.com
matsukihira-arte.com
reviviobizzo.xyz
lexindx.com
yongalcxa.digital
starair.co
foreveryoungforever.com
caktreecapital.com
1stecfed-assist.com
americascoolest.com
febmakl.online
exclusivewebmasters.com
tamplariedanielnica.net
housz.net
hailisoft.net
sentec-usa.com
faithhopelovejoy.com
yonjia.net
telepathymachine.com
hhsm.net
cleanubble.co.uk
hualong5000.com
cs4a.net
battlegroundsesportsindia.com
roymunene.com
thesilverserpent.co.uk
expertchatter.com
meexnetwork.com
watch-episodes.site
wilxzter.space
palma-mallorca.email
advmedialpt.com
yhlzj.com
restaurantecasa.net
envisiongraphx.online
atlassian.website
fesf.net
womenvibrators.com
klantings002.sbs
slpsmv.xyz
bong79.asia
goodchoose.space
hocseohanoi.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/412-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/412-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3316-24-0x0000000000130000-0x000000000015F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3508 set thread context of 412 3508 My order pdf.exe 91 PID 412 set thread context of 3468 412 RegSvcs.exe 56 PID 3316 set thread context of 3468 3316 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language My order pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 412 RegSvcs.exe 412 RegSvcs.exe 412 RegSvcs.exe 412 RegSvcs.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe 3316 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 412 RegSvcs.exe 412 RegSvcs.exe 412 RegSvcs.exe 3316 chkdsk.exe 3316 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 412 RegSvcs.exe Token: SeDebugPrivilege 3316 chkdsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3508 wrote to memory of 412 3508 My order pdf.exe 91 PID 3508 wrote to memory of 412 3508 My order pdf.exe 91 PID 3508 wrote to memory of 412 3508 My order pdf.exe 91 PID 3508 wrote to memory of 412 3508 My order pdf.exe 91 PID 3508 wrote to memory of 412 3508 My order pdf.exe 91 PID 3508 wrote to memory of 412 3508 My order pdf.exe 91 PID 3468 wrote to memory of 3316 3468 Explorer.EXE 92 PID 3468 wrote to memory of 3316 3468 Explorer.EXE 92 PID 3468 wrote to memory of 3316 3468 Explorer.EXE 92 PID 3316 wrote to memory of 1496 3316 chkdsk.exe 93 PID 3316 wrote to memory of 1496 3316 chkdsk.exe 93 PID 3316 wrote to memory of 1496 3316 chkdsk.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\My order pdf.exe"C:\Users\Admin\AppData\Local\Temp\My order pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-