Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.pdf.exe
Resource
win7-20241010-en
General
-
Target
Payment_Advice.pdf.exe
-
Size
780KB
-
MD5
86855fd89cf9d73b25db56cfddcb26bb
-
SHA1
c176adca26aefc687a5a89108b0276e0f8dfd22c
-
SHA256
6f74e80cc1e0428e9c04ade080df738cd9206a4ef51e55737af9c5b5d62ca7f4
-
SHA512
8b378e20dd307bc345ac2f800c62e9c2ac3235f782ef2fd5d8fe9b550ef82dc76182d6cb25bb592d918161da9bc5bbfd220c256848c993dcc2634721b6a12ce7
-
SSDEEP
12288:wA52iNUDjyTOhNWcAsmP55Fgf/JUni6a7n/W+ZHkOYLD:j1CfOsmP55mJOFa7//ZE5L
Malware Config
Extracted
formbook
nquy
a3sidprVANFTG0llIjdA
amYQhcIbS9blLB0=
GOqH7AZQZTYBOB8vWeHGwCVnUw==
kp1yw+EwVCesxslPY5gtZ2aiBcRa
zV/0O1+y47mCh6+5
uX0OU3R898WRBa/Rog==
6val8whPkGM9wuxTFGNI
ozzlSYzyF/XOgNSKG5fsoNYzkk+pxgDF
sHo2h6PuHfFwtOdTFGNI
xZ54yOceUB/thMxtzhp4wCVnUw==
s4pIou5HdD3C1snrARcqXw==
jiOqEVW81qEjTIs5ouY+1hZ3MGvCJg==
Nga3BkamwZ4gVmz0fb5KkYs=
DNeA3Bp8vJpd8VPogb5KkYs=
tbZjsdPoeu0sRcPUqA==
RToES3S3EqV3+g2XLLtFzOHPMXwE7JvN
+c+C3eYzcETJ8hehDlIno5I=
3KE0kK71Hf/ODgNTFGNI
MPrCqTAJbjGx
fkXl/0uKuIgIDPB+aeTYSA==
Ie+2DzGk0K1uGmsDfr5KkYs=
scl/0wJ2pH4FSI87r/1NjNEtmk0=
nWwsjsYkVTEOPibGARKeHxl5bnTMplI=
FZ49p8ECLCHhmPWAaeTYSA==
PxjG5EeL6XNB1g==
4WsBX6cCMg6hxu1TFGNI
fj4IV2Kw4sRGb5OuQnbUWpalEsbKJ1o=
9APMETJ6ppJD1gIoIGMDUXnl
HdRquMEPOhbj2ewevw==
BdiC4xZxmoIXPl1xUJwr8UWCa3TMplI=
exLLJ0KHxKEkKAxcNsFj4R9sWw==
ydKJ1SSC6XNB1g==
nnoyh9I0QCa107xgARcqXw==
8QCwFyl7s5EO2ewevw==
s3waX6YHZPO7Tmv0fL1OqyRXLlluLg==
USC3IFO8871JETXBa/U=
UxbBGjVqrIZA6FnqfL5KkYs=
WxrbI13Y+eCp9e0K2yR2wCVnUw==
e4onfccrXkQSVm/qLEC+VFeRbnTMplI=
4t2Gz+MySyf1RcPUqA==
MdaT9DdMa0bZ+wNTFGNI
LXj8J8noEus=
EuKs+zaszqgyWF3aRb4fbZalEsbKJ1o=
oqZjr8QDRCGhyuxTFGNI
zZ5Vn7X4N9blLB0=
z4gWW4LD8duvVL1f7fuG/HPj
iYgcjMgrPNWwvcXrntX2snm8HZypxgDF
M/Ps/x9enn46wuxTFGNI
WzrTM3bgEeNztedTFGNI
q2D1SXPc/dtjp/0p+EGcFhyD+nTMplI=
pmUkbq4RMPF7fmPpH18DUXnl
7e+e+gBDnTK36AQ=
LQak8gpGdEHh/wNTFGNI
YyDKFjh5lnM4ID8hcPE=
SCraRlqxyaFiUnmg
Uye1FT+42bVEebnFkK6M3iOHbHTMplI=
Acd0xd85VObjGFS25exEEIM=
BZE0SPLpVjy7
AtR73OwIe2E8cpY3hzwednfIpbV6k+O9fA==
woItf6YTRi/tRcPUqA==
dT/vTYv0H9+4UH+apjMDUXnl
WFwXe4ngC+d+sNBgARcqXw==
7KpDjaz4OBnng7xX4SrGDfcCLFo=
xJQ7iabxCPTJfNZTFGNI
lascypaaadvisory.org
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation Payment_Advice.pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2888 set thread context of 2732 2888 Payment_Advice.pdf.exe 30 PID 2732 set thread context of 1188 2732 Payment_Advice.pdf.exe 21 PID 3020 set thread context of 1188 3020 control.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment_Advice.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2732 Payment_Advice.pdf.exe 2732 Payment_Advice.pdf.exe 2732 Payment_Advice.pdf.exe 2732 Payment_Advice.pdf.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe 3020 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2732 Payment_Advice.pdf.exe 2732 Payment_Advice.pdf.exe 2732 Payment_Advice.pdf.exe 3020 control.exe 3020 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2732 Payment_Advice.pdf.exe Token: SeDebugPrivilege 3020 control.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2732 2888 Payment_Advice.pdf.exe 30 PID 2888 wrote to memory of 2732 2888 Payment_Advice.pdf.exe 30 PID 2888 wrote to memory of 2732 2888 Payment_Advice.pdf.exe 30 PID 2888 wrote to memory of 2732 2888 Payment_Advice.pdf.exe 30 PID 2888 wrote to memory of 2732 2888 Payment_Advice.pdf.exe 30 PID 2888 wrote to memory of 2732 2888 Payment_Advice.pdf.exe 30 PID 2888 wrote to memory of 2732 2888 Payment_Advice.pdf.exe 30 PID 1188 wrote to memory of 3020 1188 Explorer.EXE 31 PID 1188 wrote to memory of 3020 1188 Explorer.EXE 31 PID 1188 wrote to memory of 3020 1188 Explorer.EXE 31 PID 1188 wrote to memory of 3020 1188 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3020
-