Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order4756485.exe
Resource
win7-20240903-en
General
-
Target
Purchase order4756485.exe
-
Size
998KB
-
MD5
524421853f704a1290bbf12d849c47f2
-
SHA1
4f704d094fcabfaa9f4a73fbbfc9651bdd73406a
-
SHA256
876955f77a0817e4de8c1d5fddfc98d8fea616499f91757fb3ab7f2a6fdd1577
-
SHA512
5d41c258f21a61c6a8505546281018a294b98b34444963a0b05a375c99d92fa796599a4634dc28ebbdfff8248f170253c64d14226a04c1560d56b7c85b2d5eb1
-
SSDEEP
12288:XHAsJsJbuA1Rzdnuc9DjwjFDDKaog1h1PU+bthEJ2/FmD4EwCYyz5IDAjH:RaFuA1fucaBDK3a1PU+BcUg4zAjH
Malware Config
Extracted
formbook
4.1
crdi
propertyjumpstartwebinar.com
boc-vip.club
polestarnyc.com
travelonlinebiz.com
bukovynaent.com
bestfashoin.com
miniindiastore.com
wehatebillgates.com
holmescountyjusticecourt.com
colectivorenovemosjuntos.com
houstowarehouse.com
aocsw.com
sml-uniform.com
bandanasaint.com
petposhdeluxe.com
ezcscpawq.com
ladiesoption.club
refixu.com
selfwrrrth.com
rovietry.com
enaoc.com
karyolaw.com
diversitymarketingtx.net
browsersentenderbanco.net
samtheshepherd.com
nash-arbitrazh.com
gampang-kerja.tech
ereplacementparrts.com
eventmidasbuy14.com
sia-rikvel.com
top2016.net
686638.com
ton.blue
desktower.net
dbykq020.com
stack30.com
tiendasfotoprix.com
kylesmaier.com
ekmantsang.com
jumlasx.xyz
qingqingyuyin.com
cdnsubs.xyz
maxamoose.com
huelling.com
xn--bjrnnstet-z2a8q.online
betale-posten.com
lalatendu.info
nochipmanicure.net
bichat.website
washington32reds.com
centrodesaludcrecer.com
phihoteldeimedaglioni.com
kilmalliefarms.com
icecreamsocialwp.com
mac-makeup.club
elzooz.com
iqomw.com
bestattorneycle.com
startonsocial.com
purensoessentials.com
therealyolandafay.com
feildwolf.com
nativesupps.com
nbatimeout.com
bendhighswimming.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2600-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2600-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2764-26-0x0000000000090000-0x00000000000BE000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1252 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2648 set thread context of 2600 2648 Purchase order4756485.exe 31 PID 2600 set thread context of 1160 2600 Purchase order4756485.exe 21 PID 2764 set thread context of 1160 2764 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order4756485.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2600 Purchase order4756485.exe 2600 Purchase order4756485.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2600 Purchase order4756485.exe 2600 Purchase order4756485.exe 2600 Purchase order4756485.exe 2764 rundll32.exe 2764 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2648 Purchase order4756485.exe Token: SeDebugPrivilege 2600 Purchase order4756485.exe Token: SeDebugPrivilege 2764 rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2600 2648 Purchase order4756485.exe 31 PID 2648 wrote to memory of 2600 2648 Purchase order4756485.exe 31 PID 2648 wrote to memory of 2600 2648 Purchase order4756485.exe 31 PID 2648 wrote to memory of 2600 2648 Purchase order4756485.exe 31 PID 2648 wrote to memory of 2600 2648 Purchase order4756485.exe 31 PID 2648 wrote to memory of 2600 2648 Purchase order4756485.exe 31 PID 2648 wrote to memory of 2600 2648 Purchase order4756485.exe 31 PID 1160 wrote to memory of 2764 1160 Explorer.EXE 32 PID 1160 wrote to memory of 2764 1160 Explorer.EXE 32 PID 1160 wrote to memory of 2764 1160 Explorer.EXE 32 PID 1160 wrote to memory of 2764 1160 Explorer.EXE 32 PID 1160 wrote to memory of 2764 1160 Explorer.EXE 32 PID 1160 wrote to memory of 2764 1160 Explorer.EXE 32 PID 1160 wrote to memory of 2764 1160 Explorer.EXE 32 PID 2764 wrote to memory of 1252 2764 rundll32.exe 33 PID 2764 wrote to memory of 1252 2764 rundll32.exe 33 PID 2764 wrote to memory of 1252 2764 rundll32.exe 33 PID 2764 wrote to memory of 1252 2764 rundll32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1252
-
-