Analysis
-
max time kernel
147s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 00:19
Static task
static1
Behavioral task
behavioral1
Sample
ORDERLIST.exe
Resource
win7-20240729-en
General
-
Target
ORDERLIST.exe
-
Size
1005KB
-
MD5
2e8f7b66c45f593718e35c6f03d2a888
-
SHA1
08f1e682a23612bc7f1b574f14de4a2b978f0006
-
SHA256
2ca1fd154cb8f8f7df82b11827026c30ff1bd66840a9fc7306c4a78cf7022a09
-
SHA512
c0e1fc5d4d6a05b956d54908eb70ee43ab1fdb843079316bf2e1c9b06010f3a3d434d4dfe6dc5efaed1f156e457007c40eb6d491f4218d7cd7a1bd78772be045
-
SSDEEP
12288:O948jvBC+llKfOsskGSSO59xneQIYTBkXFYUz3S30lQY2VGamSAQdP4:OmYnlYsLmXeQIY1kXFo3eQDVZOp
Malware Config
Extracted
formbook
4.1
nr5c
solitairejqk.com
e-chew.com
javnfts.com
riotgadgets.com
whxwkj.com
hashtagstartup.net
misbantarkalong.xyz
2888sy.com
tuner-sell.com
backdecal.com
lnwindpower.com
neo-teric.com
provitac.info
yugenft.com
mountainvirtualutah.com
bestserviceusa.com
hoghooghi.net
maxicashprogfr.xyz
theshawarmarepublic.com
leelatoronto.com
grandhausdetroit.com
easasalehgurg.com
codernicus.space
selerarodjo.com
mcgowanartworks.com
gg168bj.com
842391.com
ssigaocy.xyz
mutoros.com
xn--3kq309afjbv10ea.net
vivielvis.com
oneuplord.net
daldandalaspor.com
smallbusinessnenefits.com
impiansehatideal.com
somekindof3dprinting.store
b2buzi.com
mibiaoyun.com
casaritadecassia.com
mysecuritymadesimple.com
zryli.com
elengatvs.xyz
happy-bihada.biz
xuongnoithatlongphat.com
tangerinetype.com
hellomoll.com
salescoaching.agency
les-cours.com
anubis.host
eatcalamari.com
poppymemorial.com
noahpresnell.com
1155lolalilane.com
anau4bt46few.biz
toserba.digital
caledonianspecialevents.online
afirstwaypharma.online
iptables-blacklist.net
catchmarkit.xyz
e-streetcars.com
zahidrasool.com
losmejores.info
omnt.top
baogtech.com
westsummitbooks.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2136-26-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2136-29-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2628-32-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2764 exploreres.exe 2136 AddInProcess32.exe -
Loads dropped DLL 2 IoCs
pid Process 2956 cmd.exe 2764 exploreres.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\exploreres = "C:\\Users\\Admin\\AppData\\Roaming\\exploreres.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2764 set thread context of 2136 2764 exploreres.exe 39 PID 2136 set thread context of 1284 2136 AddInProcess32.exe 21 PID 2136 set thread context of 1284 2136 AddInProcess32.exe 21 PID 2628 set thread context of 1284 2628 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exploreres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDERLIST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1964 cmd.exe 2936 PING.EXE 2956 cmd.exe 2948 PING.EXE 2728 PING.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-2703099537-420551529-3771253338-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2936 PING.EXE 2948 PING.EXE 2728 PING.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1520 ORDERLIST.exe 1520 ORDERLIST.exe 1520 ORDERLIST.exe 1520 ORDERLIST.exe 1520 ORDERLIST.exe 2764 exploreres.exe 2764 exploreres.exe 2136 AddInProcess32.exe 2136 AddInProcess32.exe 2136 AddInProcess32.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2136 AddInProcess32.exe 2136 AddInProcess32.exe 2136 AddInProcess32.exe 2136 AddInProcess32.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe 2628 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1520 ORDERLIST.exe Token: SeDebugPrivilege 2764 exploreres.exe Token: SeDebugPrivilege 2136 AddInProcess32.exe Token: SeDebugPrivilege 2628 wlanext.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1964 1520 ORDERLIST.exe 30 PID 1520 wrote to memory of 1964 1520 ORDERLIST.exe 30 PID 1520 wrote to memory of 1964 1520 ORDERLIST.exe 30 PID 1520 wrote to memory of 1964 1520 ORDERLIST.exe 30 PID 1964 wrote to memory of 2936 1964 cmd.exe 32 PID 1964 wrote to memory of 2936 1964 cmd.exe 32 PID 1964 wrote to memory of 2936 1964 cmd.exe 32 PID 1964 wrote to memory of 2936 1964 cmd.exe 32 PID 1520 wrote to memory of 2956 1520 ORDERLIST.exe 33 PID 1520 wrote to memory of 2956 1520 ORDERLIST.exe 33 PID 1520 wrote to memory of 2956 1520 ORDERLIST.exe 33 PID 1520 wrote to memory of 2956 1520 ORDERLIST.exe 33 PID 2956 wrote to memory of 2948 2956 cmd.exe 35 PID 2956 wrote to memory of 2948 2956 cmd.exe 35 PID 2956 wrote to memory of 2948 2956 cmd.exe 35 PID 2956 wrote to memory of 2948 2956 cmd.exe 35 PID 1964 wrote to memory of 2080 1964 cmd.exe 36 PID 1964 wrote to memory of 2080 1964 cmd.exe 36 PID 1964 wrote to memory of 2080 1964 cmd.exe 36 PID 1964 wrote to memory of 2080 1964 cmd.exe 36 PID 2956 wrote to memory of 2728 2956 cmd.exe 37 PID 2956 wrote to memory of 2728 2956 cmd.exe 37 PID 2956 wrote to memory of 2728 2956 cmd.exe 37 PID 2956 wrote to memory of 2728 2956 cmd.exe 37 PID 2956 wrote to memory of 2764 2956 cmd.exe 38 PID 2956 wrote to memory of 2764 2956 cmd.exe 38 PID 2956 wrote to memory of 2764 2956 cmd.exe 38 PID 2956 wrote to memory of 2764 2956 cmd.exe 38 PID 2764 wrote to memory of 2136 2764 exploreres.exe 39 PID 2764 wrote to memory of 2136 2764 exploreres.exe 39 PID 2764 wrote to memory of 2136 2764 exploreres.exe 39 PID 2764 wrote to memory of 2136 2764 exploreres.exe 39 PID 2764 wrote to memory of 2136 2764 exploreres.exe 39 PID 2764 wrote to memory of 2136 2764 exploreres.exe 39 PID 2764 wrote to memory of 2136 2764 exploreres.exe 39 PID 1284 wrote to memory of 2628 1284 Explorer.EXE 40 PID 1284 wrote to memory of 2628 1284 Explorer.EXE 40 PID 1284 wrote to memory of 2628 1284 Explorer.EXE 40 PID 1284 wrote to memory of 2628 1284 Explorer.EXE 40 PID 2628 wrote to memory of 832 2628 wlanext.exe 41 PID 2628 wrote to memory of 832 2628 wlanext.exe 41 PID 2628 wrote to memory of 832 2628 wlanext.exe 41 PID 2628 wrote to memory of 832 2628 wlanext.exe 41 PID 2628 wrote to memory of 832 2628 wlanext.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\ORDERLIST.exe"C:\Users\Admin\AppData\Local\Temp\ORDERLIST.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 18 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "exploreres" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\exploreres.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 184⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2936
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "exploreres" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\exploreres.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 19 > nul && copy "C:\Users\Admin\AppData\Local\Temp\ORDERLIST.exe" "C:\Users\Admin\AppData\Roaming\exploreres.exe" && ping 127.0.0.1 -n 19 > nul && "C:\Users\Admin\AppData\Roaming\exploreres.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 194⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2948
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 194⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2728
-
-
C:\Users\Admin\AppData\Roaming\exploreres.exe"C:\Users\Admin\AppData\Roaming\exploreres.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:832
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
Filesize
1005KB
MD52e8f7b66c45f593718e35c6f03d2a888
SHA108f1e682a23612bc7f1b574f14de4a2b978f0006
SHA2562ca1fd154cb8f8f7df82b11827026c30ff1bd66840a9fc7306c4a78cf7022a09
SHA512c0e1fc5d4d6a05b956d54908eb70ee43ab1fdb843079316bf2e1c9b06010f3a3d434d4dfe6dc5efaed1f156e457007c40eb6d491f4218d7cd7a1bd78772be045