Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
Quotation_2353882378.pdf.exe
Resource
win7-20241010-en
General
-
Target
Quotation_2353882378.pdf.exe
-
Size
891KB
-
MD5
e13096d3bdcbb8a331d0cfd2114998ff
-
SHA1
5c19600fbd7c9dd4693e0c408803fe2bf50f04a9
-
SHA256
7ae4fad494657ec1621fcfe3005d577a4d8ca04847ca48eb466e4649f00faad3
-
SHA512
5d259ed4e4b6bf2827b668649a748dd5705debc35041feae245962f2f4dc5253aedd4aabec19baf5821edcb802f8b1f2b4816267e3627ce51fdb5bc070570e43
-
SSDEEP
24576:MGb3AdbcDnunGjCVvUFKEg+blsIYZxsn/amHgyUNC:vmWnD8UFKE/OIxgyUN
Malware Config
Extracted
formbook
4.1
kzsw
thelargedoor.com
newcuus.com
tgc.xyz
americanrvwarranties.com
deroshop.com
wagyu-importer.com
frbhomeloan.com
taniabeautysalonspa.com
nac-alerton.com
ordersudsy.com
villagegardengreeley.com
locksmithpembrokepines.com
rafsanjan.net
jumlasx.xyz
supermercadoveganmadrid.com
rubsalmon.com
glenhelensaturdaymotocross.com
jichuang888.club
aajnv.com
stackablesllc.com
elevatebuilder.com
higrandtechnologies.com
lssqzyg.com
zjszxs.com
ssgasiu.com
brianterrymarketing.com
nyatiera.com
elemetasu.com
larouedesecours.info
customerye.com
riotgentler.com
wwwjeansjewerlys.com
egyptcon.com
hona-iq.com
residsfranchise.com
flamingogrouprealty.com
windycitywoodturners.club
maineguidedfishing.com
krushirajyafarms.com
scottsdaledrycleanaz.com
eisdjsd.asia
gelgoodplus.com
numericcarbon.com
zszq665.com
researchripples.com
pravschool.com
lanshan1688.com
bashcovid19.com
enableauth.com
azbibi.com
nearyapi.com
cqshenchi.com
ipandasz.com
persero14.com
lemonadecrystal.com
sekrema2049.com
chilternss.com
bestsgiftstore.com
vlansi.icu
namasteyg.com
msjshelfit.com
harbee.net
smiley.team
sopnosoft.com
liveonlinehdplay24.com
Signatures
-
Formbook family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/2304-9-0x0000000006850000-0x000000000685A000-memory.dmp CustAttr -
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/548-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/548-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/548-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2624-28-0x0000000000500000-0x000000000052E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2304 set thread context of 548 2304 Quotation_2353882378.pdf.exe 91 PID 548 set thread context of 3568 548 Quotation_2353882378.pdf.exe 56 PID 548 set thread context of 3568 548 Quotation_2353882378.pdf.exe 56 PID 2624 set thread context of 3568 2624 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation_2353882378.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2624 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2304 Quotation_2353882378.pdf.exe 2304 Quotation_2353882378.pdf.exe 2304 Quotation_2353882378.pdf.exe 2304 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE 2624 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 548 Quotation_2353882378.pdf.exe 2624 NETSTAT.EXE 2624 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2304 Quotation_2353882378.pdf.exe Token: SeDebugPrivilege 548 Quotation_2353882378.pdf.exe Token: SeDebugPrivilege 2624 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2304 wrote to memory of 548 2304 Quotation_2353882378.pdf.exe 91 PID 2304 wrote to memory of 548 2304 Quotation_2353882378.pdf.exe 91 PID 2304 wrote to memory of 548 2304 Quotation_2353882378.pdf.exe 91 PID 2304 wrote to memory of 548 2304 Quotation_2353882378.pdf.exe 91 PID 2304 wrote to memory of 548 2304 Quotation_2353882378.pdf.exe 91 PID 2304 wrote to memory of 548 2304 Quotation_2353882378.pdf.exe 91 PID 3568 wrote to memory of 2624 3568 Explorer.EXE 92 PID 3568 wrote to memory of 2624 3568 Explorer.EXE 92 PID 3568 wrote to memory of 2624 3568 Explorer.EXE 92 PID 2624 wrote to memory of 976 2624 NETSTAT.EXE 93 PID 2624 wrote to memory of 976 2624 NETSTAT.EXE 93 PID 2624 wrote to memory of 976 2624 NETSTAT.EXE 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation_2353882378.pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:976
-
-