Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
AT0001-Purchase order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AT0001-Purchase order.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xhxsojqn.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
xhxsojqn.exe
Resource
win10v2004-20241007-en
General
-
Target
AT0001-Purchase order.exe
-
Size
316KB
-
MD5
a98ae50f4a149db303f4e345c900c9f1
-
SHA1
5fbda81750c932bf64d2a57d773867679953bc90
-
SHA256
d93009185b1d089f922fbfc67ab4097a178f63b5f18f538a88b24a869ab70c12
-
SHA512
45aa93cc3031e44b5d2478d918b6004932a3bbd51b9930cc47124aa67f3e0a1a1a830d170e0f959cf63423cb99b66eba2e3188047a579d2cd155dc96c103dbf6
-
SSDEEP
6144:kNeZOWWFI0Dp6DHuZlsljfVaR9gnrBfp3lT:kN5WWFI0SHzlj3nr9pVT
Malware Config
Extracted
formbook
4.1
gd08
discover-tiktok.com
vgyvgycc.com
mrsg.xyz
alredwan.net
d1guoji.com
0519bjw.com
robinhoodplu.com
thechickscincinnati.com
efq2ci2.cfd
vgas4.xyz
s3y4b19.cfd
desertcaviar.com
capricho.xyz
flaujae.com
lensmaintenance3.com
1kjia39.cfd
tqn6.com
needammuntionnotaride.com
2681h.com
braincloudstudios.net
sex68.xyz
cormun.xyz
mariajunquera.com
bullveed.com
wo166.com
eeshvi.com
mx9coyc.cfd
handywiki.net
mmaassociatesclaims.com
mycarewell.com
dlscribe.com
vintagetoycars.net
forwardexpectations.net
xpsafelink.com
welltures.com
ruifushidai.com
livevoxels.com
ddzwnq.com
promgroups.com
dsy-st.com
secoviblumenau.com
cbtdy5o.cfd
staging-adultbevoffers.com
jncj168.com
touptly.online
mrazwish.com
rkspanama.net
laverdad.xyz
merrylandquynhon-hungthinh.info
pral.xyz
sentrycasandra.com
fasttrackerstours.com
vendtonchar.com
weatherstationss.com
jinlucheng.com
idamankeluarga.com
xlymn.com
cutleryhouse.com
kylakerealtor.com
doctorg.xyz
expanse.team
xzr5qj7.cfd
bizcreditneeds.com
semprenoivastapetes.com
hantoub.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/836-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/836-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2776-26-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 808 xhxsojqn.exe 836 xhxsojqn.exe -
Loads dropped DLL 3 IoCs
pid Process 2288 AT0001-Purchase order.exe 2288 AT0001-Purchase order.exe 808 xhxsojqn.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 808 set thread context of 836 808 xhxsojqn.exe 29 PID 836 set thread context of 1192 836 xhxsojqn.exe 21 PID 2776 set thread context of 1192 2776 NETSTAT.EXE 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AT0001-Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhxsojqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2776 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 836 xhxsojqn.exe 836 xhxsojqn.exe 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE 2776 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 836 xhxsojqn.exe 836 xhxsojqn.exe 836 xhxsojqn.exe 2776 NETSTAT.EXE 2776 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 836 xhxsojqn.exe Token: SeDebugPrivilege 2776 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2288 wrote to memory of 808 2288 AT0001-Purchase order.exe 28 PID 2288 wrote to memory of 808 2288 AT0001-Purchase order.exe 28 PID 2288 wrote to memory of 808 2288 AT0001-Purchase order.exe 28 PID 2288 wrote to memory of 808 2288 AT0001-Purchase order.exe 28 PID 808 wrote to memory of 836 808 xhxsojqn.exe 29 PID 808 wrote to memory of 836 808 xhxsojqn.exe 29 PID 808 wrote to memory of 836 808 xhxsojqn.exe 29 PID 808 wrote to memory of 836 808 xhxsojqn.exe 29 PID 808 wrote to memory of 836 808 xhxsojqn.exe 29 PID 808 wrote to memory of 836 808 xhxsojqn.exe 29 PID 808 wrote to memory of 836 808 xhxsojqn.exe 29 PID 1192 wrote to memory of 2776 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2776 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2776 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2776 1192 Explorer.EXE 30 PID 2776 wrote to memory of 2292 2776 NETSTAT.EXE 31 PID 2776 wrote to memory of 2292 2776 NETSTAT.EXE 31 PID 2776 wrote to memory of 2292 2776 NETSTAT.EXE 31 PID 2776 wrote to memory of 2292 2776 NETSTAT.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exeC:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exeC:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5a54aa4b50f7094b132058491a76ebfa8
SHA110443981f6085918b774825a7e865be88ea45d6a
SHA25693b2893199ee2f6b28e761bfd621d612bb438b95f652bc995490f73094dcb7d5
SHA51264c1286730796087f1656af8b365b57fd3cba6d7b9fdda45002c92413b0d0cd40322e2da6717001f5a74d03a35124f85d0f87104f793396a717a24fb8835a3bd
-
Filesize
4KB
MD5eab172f7c2a6cd4dda552caf2d97b71d
SHA1d2c997bc8f5ee13e6e4efc87f5214ae0259b021f
SHA256724703b34be8f256a1fbe8734619063dd0d3bf3c05e444f47d29691bd941d84e
SHA5125975d239634bf8cb95c3a6d6f629e90d17bd98670551dbbdb823aa06083340a514ce79de86e12306a3ef3092965350cd5240250756091a98016a1aabc8c77fb1
-
Filesize
4KB
MD5cfb2774909a615a38d13977af09c6885
SHA153f7c365ec213d93da2d73250d706afd824c76d5
SHA2568506e5d45c6f8e51e89c0e8e188f4bb0b5c3eb1c98a0d3dc7085087156382508
SHA512da94a4ea2d0dcb75e45f9d7a36f413607ed521946539b6178840893c7ff066a259a8e5ed137ab4513473499776f251695f0180d7d9cb1656ba4f57c921e22b9d