Analysis
-
max time kernel
146s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
Quotation_2353882378.pdf.exe
Resource
win7-20241010-en
General
-
Target
Quotation_2353882378.pdf.exe
-
Size
891KB
-
MD5
e13096d3bdcbb8a331d0cfd2114998ff
-
SHA1
5c19600fbd7c9dd4693e0c408803fe2bf50f04a9
-
SHA256
7ae4fad494657ec1621fcfe3005d577a4d8ca04847ca48eb466e4649f00faad3
-
SHA512
5d259ed4e4b6bf2827b668649a748dd5705debc35041feae245962f2f4dc5253aedd4aabec19baf5821edcb802f8b1f2b4816267e3627ce51fdb5bc070570e43
-
SSDEEP
24576:MGb3AdbcDnunGjCVvUFKEg+blsIYZxsn/amHgyUNC:vmWnD8UFKE/OIxgyUN
Malware Config
Extracted
formbook
4.1
kzsw
thelargedoor.com
newcuus.com
tgc.xyz
americanrvwarranties.com
deroshop.com
wagyu-importer.com
frbhomeloan.com
taniabeautysalonspa.com
nac-alerton.com
ordersudsy.com
villagegardengreeley.com
locksmithpembrokepines.com
rafsanjan.net
jumlasx.xyz
supermercadoveganmadrid.com
rubsalmon.com
glenhelensaturdaymotocross.com
jichuang888.club
aajnv.com
stackablesllc.com
elevatebuilder.com
higrandtechnologies.com
lssqzyg.com
zjszxs.com
ssgasiu.com
brianterrymarketing.com
nyatiera.com
elemetasu.com
larouedesecours.info
customerye.com
riotgentler.com
wwwjeansjewerlys.com
egyptcon.com
hona-iq.com
residsfranchise.com
flamingogrouprealty.com
windycitywoodturners.club
maineguidedfishing.com
krushirajyafarms.com
scottsdaledrycleanaz.com
eisdjsd.asia
gelgoodplus.com
numericcarbon.com
zszq665.com
researchripples.com
pravschool.com
lanshan1688.com
bashcovid19.com
enableauth.com
azbibi.com
nearyapi.com
cqshenchi.com
ipandasz.com
persero14.com
lemonadecrystal.com
sekrema2049.com
chilternss.com
bestsgiftstore.com
vlansi.icu
namasteyg.com
msjshelfit.com
harbee.net
smiley.team
sopnosoft.com
liveonlinehdplay24.com
Signatures
-
Formbook family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2164-3-0x0000000000840000-0x000000000084A000-memory.dmp CustAttr -
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2372-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2372-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2356-25-0x0000000000360000-0x000000000038E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2364 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2164 set thread context of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 2372 set thread context of 1204 2372 Quotation_2353882378.pdf.exe 20 PID 2356 set thread context of 1204 2356 explorer.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation_2353882378.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2164 Quotation_2353882378.pdf.exe 2164 Quotation_2353882378.pdf.exe 2164 Quotation_2353882378.pdf.exe 2372 Quotation_2353882378.pdf.exe 2372 Quotation_2353882378.pdf.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2372 Quotation_2353882378.pdf.exe 2372 Quotation_2353882378.pdf.exe 2372 Quotation_2353882378.pdf.exe 2356 explorer.exe 2356 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2164 Quotation_2353882378.pdf.exe Token: SeDebugPrivilege 2372 Quotation_2353882378.pdf.exe Token: SeDebugPrivilege 2356 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 2164 wrote to memory of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 2164 wrote to memory of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 2164 wrote to memory of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 2164 wrote to memory of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 2164 wrote to memory of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 2164 wrote to memory of 2372 2164 Quotation_2353882378.pdf.exe 29 PID 1204 wrote to memory of 2356 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2356 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2356 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2356 1204 Explorer.EXE 30 PID 2356 wrote to memory of 2364 2356 explorer.exe 31 PID 2356 wrote to memory of 2364 2356 explorer.exe 31 PID 2356 wrote to memory of 2364 2356 explorer.exe 31 PID 2356 wrote to memory of 2364 2356 explorer.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2364
-
-