Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
Confirm Proforma Invoice.exe
Resource
win7-20241023-en
General
-
Target
Confirm Proforma Invoice.exe
-
Size
439KB
-
MD5
c8c984aa8535536070c90dda6d6a46a8
-
SHA1
431ed99f88f68b9933fbf8b642c44150565852b8
-
SHA256
a344590804a69e6f50c2386206d5d050db788fcd42716d1c14f77ba501e63d4e
-
SHA512
14d10fab4f19796e53e2075bc9b27df8f217af28d97ea250f2ae5f83421bb568bd3a58888e89ad036a4b5a4a2d3d388ffbd4f914c6f9c28e7c165f487a47c5c9
-
SSDEEP
12288:OCv2zv1grDRQiSSJWP7BCBkNAUqIwrk6WjL2iN:OV212BCmNAUarqn1
Malware Config
Extracted
formbook
4.1
rwo
highjinxed.com
adwawattan.com
alimitlesslifeinc.com
advancedtelecom.net
metrocommunitycollege.com
modboutik.com
myfavoritethemepark.com
slimwasit.com
curlygirlrizos.com
nyshuffle.com
allovermeofficial.com
bugsy67.com
simcardtonewow.com
onlinepaints.xyz
epoxykingsofamerica.com
cbdstrata.com
liceremovalbellevue.com
bj5w.xyz
lalalae.com
glory-made.com
leninxk.com
cdyy-kwrjg.xyz
rjoyrpd.icu
vantopholdings.com
primerseasonings.com
femalerivalry.com
stockproductionmusic.works
gzhmulu.com
heatingcoolinghvac.com
blackbeautybodi.com
kudos.homes
hemingwaybeachresorts.info
ad-wish.com
uimage.net
popperpup.com
lykfqsy.com
well-dresseds.com
toygrad.com
shanzhuo.net
epictmaes.com
nowananimal.net
ecloudbook.com
carolcavanagh.co.uk
sign-in-ios.net
makeproductcool.com
beardedsaiyan253.com
ronanderson.net
envisionbizz.com
gyxyjd.com
jhpaolilo.com
303capitol.com
officiallysingles.com
thecheapervegan.com
youronlinewholesaler.com
goodchoicebernard.com
expansionchannel.com
desireezzplus.com
hotradio1.com
aftrprty.com
yuughyi.com
auroracoupons.net
elgdiamonds.com
xn--hg3bo9g2hr6x.com
isearchgo.com
viewtus.xyz
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1260-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1260-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1736 set thread context of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1260 set thread context of 1188 1260 vbc.exe 21 PID 2776 set thread context of 1188 2776 ipconfig.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Confirm Proforma Invoice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2776 ipconfig.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1163522206-1469769407-485553996-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1260 vbc.exe 1260 vbc.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1260 vbc.exe 1260 vbc.exe 1260 vbc.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe 2776 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1260 vbc.exe Token: SeDebugPrivilege 2776 ipconfig.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1736 wrote to memory of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1736 wrote to memory of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1736 wrote to memory of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1736 wrote to memory of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1736 wrote to memory of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1736 wrote to memory of 1260 1736 Confirm Proforma Invoice.exe 31 PID 1188 wrote to memory of 2776 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2776 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2776 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2776 1188 Explorer.EXE 32 PID 2776 wrote to memory of 540 2776 ipconfig.exe 33 PID 2776 wrote to memory of 540 2776 ipconfig.exe 33 PID 2776 wrote to memory of 540 2776 ipconfig.exe 33 PID 2776 wrote to memory of 540 2776 ipconfig.exe 33 PID 2776 wrote to memory of 540 2776 ipconfig.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Confirm Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Confirm Proforma Invoice.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:540
-
-