Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order4756485.exe
Resource
win7-20240903-en
General
-
Target
Purchase order4756485.exe
-
Size
998KB
-
MD5
524421853f704a1290bbf12d849c47f2
-
SHA1
4f704d094fcabfaa9f4a73fbbfc9651bdd73406a
-
SHA256
876955f77a0817e4de8c1d5fddfc98d8fea616499f91757fb3ab7f2a6fdd1577
-
SHA512
5d41c258f21a61c6a8505546281018a294b98b34444963a0b05a375c99d92fa796599a4634dc28ebbdfff8248f170253c64d14226a04c1560d56b7c85b2d5eb1
-
SSDEEP
12288:XHAsJsJbuA1Rzdnuc9DjwjFDDKaog1h1PU+bthEJ2/FmD4EwCYyz5IDAjH:RaFuA1fucaBDK3a1PU+BcUg4zAjH
Malware Config
Extracted
formbook
4.1
crdi
propertyjumpstartwebinar.com
boc-vip.club
polestarnyc.com
travelonlinebiz.com
bukovynaent.com
bestfashoin.com
miniindiastore.com
wehatebillgates.com
holmescountyjusticecourt.com
colectivorenovemosjuntos.com
houstowarehouse.com
aocsw.com
sml-uniform.com
bandanasaint.com
petposhdeluxe.com
ezcscpawq.com
ladiesoption.club
refixu.com
selfwrrrth.com
rovietry.com
enaoc.com
karyolaw.com
diversitymarketingtx.net
browsersentenderbanco.net
samtheshepherd.com
nash-arbitrazh.com
gampang-kerja.tech
ereplacementparrts.com
eventmidasbuy14.com
sia-rikvel.com
top2016.net
686638.com
ton.blue
desktower.net
dbykq020.com
stack30.com
tiendasfotoprix.com
kylesmaier.com
ekmantsang.com
jumlasx.xyz
qingqingyuyin.com
cdnsubs.xyz
maxamoose.com
huelling.com
xn--bjrnnstet-z2a8q.online
betale-posten.com
lalatendu.info
nochipmanicure.net
bichat.website
washington32reds.com
centrodesaludcrecer.com
phihoteldeimedaglioni.com
kilmalliefarms.com
icecreamsocialwp.com
mac-makeup.club
elzooz.com
iqomw.com
bestattorneycle.com
startonsocial.com
purensoessentials.com
therealyolandafay.com
feildwolf.com
nativesupps.com
nbatimeout.com
bendhighswimming.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3716-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3716-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3160-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3152 set thread context of 3716 3152 Purchase order4756485.exe 91 PID 3716 set thread context of 3392 3716 Purchase order4756485.exe 56 PID 3160 set thread context of 3392 3160 cmstp.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order4756485.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3152 Purchase order4756485.exe 3716 Purchase order4756485.exe 3716 Purchase order4756485.exe 3716 Purchase order4756485.exe 3716 Purchase order4756485.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe 3160 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3716 Purchase order4756485.exe 3716 Purchase order4756485.exe 3716 Purchase order4756485.exe 3160 cmstp.exe 3160 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3152 Purchase order4756485.exe Token: SeDebugPrivilege 3716 Purchase order4756485.exe Token: SeDebugPrivilege 3160 cmstp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3716 3152 Purchase order4756485.exe 91 PID 3152 wrote to memory of 3716 3152 Purchase order4756485.exe 91 PID 3152 wrote to memory of 3716 3152 Purchase order4756485.exe 91 PID 3152 wrote to memory of 3716 3152 Purchase order4756485.exe 91 PID 3152 wrote to memory of 3716 3152 Purchase order4756485.exe 91 PID 3152 wrote to memory of 3716 3152 Purchase order4756485.exe 91 PID 3392 wrote to memory of 3160 3392 Explorer.EXE 92 PID 3392 wrote to memory of 3160 3392 Explorer.EXE 92 PID 3392 wrote to memory of 3160 3392 Explorer.EXE 92 PID 3160 wrote to memory of 3324 3160 cmstp.exe 93 PID 3160 wrote to memory of 3324 3160 cmstp.exe 93 PID 3160 wrote to memory of 3324 3160 cmstp.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase order4756485.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3324
-
-