Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.pdf.exe
Resource
win7-20241010-en
General
-
Target
Payment_Advice.pdf.exe
-
Size
780KB
-
MD5
86855fd89cf9d73b25db56cfddcb26bb
-
SHA1
c176adca26aefc687a5a89108b0276e0f8dfd22c
-
SHA256
6f74e80cc1e0428e9c04ade080df738cd9206a4ef51e55737af9c5b5d62ca7f4
-
SHA512
8b378e20dd307bc345ac2f800c62e9c2ac3235f782ef2fd5d8fe9b550ef82dc76182d6cb25bb592d918161da9bc5bbfd220c256848c993dcc2634721b6a12ce7
-
SSDEEP
12288:wA52iNUDjyTOhNWcAsmP55Fgf/JUni6a7n/W+ZHkOYLD:j1CfOsmP55mJOFa7//ZE5L
Malware Config
Extracted
formbook
nquy
a3sidprVANFTG0llIjdA
amYQhcIbS9blLB0=
GOqH7AZQZTYBOB8vWeHGwCVnUw==
kp1yw+EwVCesxslPY5gtZ2aiBcRa
zV/0O1+y47mCh6+5
uX0OU3R898WRBa/Rog==
6val8whPkGM9wuxTFGNI
ozzlSYzyF/XOgNSKG5fsoNYzkk+pxgDF
sHo2h6PuHfFwtOdTFGNI
xZ54yOceUB/thMxtzhp4wCVnUw==
s4pIou5HdD3C1snrARcqXw==
jiOqEVW81qEjTIs5ouY+1hZ3MGvCJg==
Nga3BkamwZ4gVmz0fb5KkYs=
DNeA3Bp8vJpd8VPogb5KkYs=
tbZjsdPoeu0sRcPUqA==
RToES3S3EqV3+g2XLLtFzOHPMXwE7JvN
+c+C3eYzcETJ8hehDlIno5I=
3KE0kK71Hf/ODgNTFGNI
MPrCqTAJbjGx
fkXl/0uKuIgIDPB+aeTYSA==
Ie+2DzGk0K1uGmsDfr5KkYs=
scl/0wJ2pH4FSI87r/1NjNEtmk0=
nWwsjsYkVTEOPibGARKeHxl5bnTMplI=
FZ49p8ECLCHhmPWAaeTYSA==
PxjG5EeL6XNB1g==
4WsBX6cCMg6hxu1TFGNI
fj4IV2Kw4sRGb5OuQnbUWpalEsbKJ1o=
9APMETJ6ppJD1gIoIGMDUXnl
HdRquMEPOhbj2ewevw==
BdiC4xZxmoIXPl1xUJwr8UWCa3TMplI=
exLLJ0KHxKEkKAxcNsFj4R9sWw==
ydKJ1SSC6XNB1g==
nnoyh9I0QCa107xgARcqXw==
8QCwFyl7s5EO2ewevw==
s3waX6YHZPO7Tmv0fL1OqyRXLlluLg==
USC3IFO8871JETXBa/U=
UxbBGjVqrIZA6FnqfL5KkYs=
WxrbI13Y+eCp9e0K2yR2wCVnUw==
e4onfccrXkQSVm/qLEC+VFeRbnTMplI=
4t2Gz+MySyf1RcPUqA==
MdaT9DdMa0bZ+wNTFGNI
LXj8J8noEus=
EuKs+zaszqgyWF3aRb4fbZalEsbKJ1o=
oqZjr8QDRCGhyuxTFGNI
zZ5Vn7X4N9blLB0=
z4gWW4LD8duvVL1f7fuG/HPj
iYgcjMgrPNWwvcXrntX2snm8HZypxgDF
M/Ps/x9enn46wuxTFGNI
WzrTM3bgEeNztedTFGNI
q2D1SXPc/dtjp/0p+EGcFhyD+nTMplI=
pmUkbq4RMPF7fmPpH18DUXnl
7e+e+gBDnTK36AQ=
LQak8gpGdEHh/wNTFGNI
YyDKFjh5lnM4ID8hcPE=
SCraRlqxyaFiUnmg
Uye1FT+42bVEebnFkK6M3iOHbHTMplI=
Acd0xd85VObjGFS25exEEIM=
BZE0SPLpVjy7
AtR73OwIe2E8cpY3hzwednfIpbV6k+O9fA==
woItf6YTRi/tRcPUqA==
dT/vTYv0H9+4UH+apjMDUXnl
WFwXe4ngC+d+sNBgARcqXw==
7KpDjaz4OBnng7xX4SrGDfcCLFo=
xJQ7iabxCPTJfNZTFGNI
lascypaaadvisory.org
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Payment_Advice.pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4788 set thread context of 2192 4788 Payment_Advice.pdf.exe 99 PID 2192 set thread context of 3496 2192 Payment_Advice.pdf.exe 56 PID 3816 set thread context of 3496 3816 control.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment_Advice.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe -
description ioc Process Key created \Registry\User\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 2192 Payment_Advice.pdf.exe 3816 control.exe 3816 control.exe 3816 control.exe 3816 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2192 Payment_Advice.pdf.exe Token: SeDebugPrivilege 3816 control.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2192 4788 Payment_Advice.pdf.exe 99 PID 4788 wrote to memory of 2192 4788 Payment_Advice.pdf.exe 99 PID 4788 wrote to memory of 2192 4788 Payment_Advice.pdf.exe 99 PID 4788 wrote to memory of 2192 4788 Payment_Advice.pdf.exe 99 PID 4788 wrote to memory of 2192 4788 Payment_Advice.pdf.exe 99 PID 4788 wrote to memory of 2192 4788 Payment_Advice.pdf.exe 99 PID 3496 wrote to memory of 3816 3496 Explorer.EXE 107 PID 3496 wrote to memory of 3816 3496 Explorer.EXE 107 PID 3496 wrote to memory of 3816 3496 Explorer.EXE 107 PID 3816 wrote to memory of 2376 3816 control.exe 109 PID 3816 wrote to memory of 2376 3816 control.exe 109 PID 3816 wrote to memory of 2376 3816 control.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:5016
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:4776
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3580
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:5048
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2224
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3724
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2100
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2376
-
-