Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
Request for quotation- Enquiry No55.exe
Resource
win7-20240903-en
General
-
Target
Request for quotation- Enquiry No55.exe
-
Size
696KB
-
MD5
fc9af02d076b78651a901d8fdec5a0f9
-
SHA1
aba47907f5717185cb4caf13aa5e7a4ca2bf003e
-
SHA256
e6d2c97461c6aac9ea130eaa96f9927b57998c04b5e7573a555caa729178a70c
-
SHA512
4b202232e9a127d31cc56e47b01f43c0a4925b2da62a33fcdac7c23daecd85d82af33bce391f2dbaf5b847271d9c5ecd7ec6602575d39946ad61c6027d8bf6b8
-
SSDEEP
12288:7Ke0fsk2iNwRL1ROZ+NU/SbJKT1hxhH3c4STBmZNvAjAGM6Dn5pDbXteGm6t:74F1Su+ewJixoTBmZAK6Dn3nm
Malware Config
Extracted
formbook
4.1
pna
responsibleson.com
crown-friendly.info
cyberwastemanagement.com
broncoscards.com
artwithjessica.com
present-motherhood.com
alarmaantiokupacion.com
bluecollarjim.com
sneguard.com
digitalsept.com
terrycareerconsulting.com
watch-lover.site
funkytees.kiwi
xn--f1adbavc.online
hitchlove.com
elmejorsetup.com
koc14338.com
obruchalnye-kolca.com
zambezia-promo.info
mataangin.net
orgefy.com
sonajhuri.com
runmesport.com
edxar.xyz
healthy-time.info
vade.photography
alon-mail.com
healthpassportkenya.com
kuaiyibaozhuang.com
ssslagrandred.com
kwalie.com
miamitammycakes.com
pqggl.com
analogmediaempire.com
coyaneducation.com
kidsbritanica.com
jaliis.com
notarylightintransit.com
klinikpsikologgultenyildiz.com
tao1hui.com
georgiairwincoaching.com
needsatdoor.com
hotelcastillito.com
locallygrownmedia.com
elmmgmt.com
crispypitbikes.com
abilityi.com
breadultimatetalk.com
fitnessmantis.com
wenche8.com
columbiariverweddings.com
sharpinion.com
videosdownloader.world
flanco.agency
universopedia.com
mnrzyhlmu.icu
yorkshiremotorcycles.com
vriker.com
konstrukt-planung.com
connectmybitcoin.com
brologan.com
asisee.photos
kidsmagic.online
margotalexis.com
dagadia.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/768-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/768-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/768-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 688 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2328 set thread context of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 768 set thread context of 1196 768 Request for quotation- Enquiry No55.exe 21 PID 768 set thread context of 1196 768 Request for quotation- Enquiry No55.exe 21 PID 2224 set thread context of 1196 2224 ipconfig.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request for quotation- Enquiry No55.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2224 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 768 Request for quotation- Enquiry No55.exe 768 Request for quotation- Enquiry No55.exe 768 Request for quotation- Enquiry No55.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe 2224 ipconfig.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 768 Request for quotation- Enquiry No55.exe 768 Request for quotation- Enquiry No55.exe 768 Request for quotation- Enquiry No55.exe 768 Request for quotation- Enquiry No55.exe 2224 ipconfig.exe 2224 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 768 Request for quotation- Enquiry No55.exe Token: SeDebugPrivilege 2224 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2328 wrote to memory of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 2328 wrote to memory of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 2328 wrote to memory of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 2328 wrote to memory of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 2328 wrote to memory of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 2328 wrote to memory of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 2328 wrote to memory of 768 2328 Request for quotation- Enquiry No55.exe 31 PID 1196 wrote to memory of 2224 1196 Explorer.EXE 43 PID 1196 wrote to memory of 2224 1196 Explorer.EXE 43 PID 1196 wrote to memory of 2224 1196 Explorer.EXE 43 PID 1196 wrote to memory of 2224 1196 Explorer.EXE 43 PID 2224 wrote to memory of 688 2224 ipconfig.exe 44 PID 2224 wrote to memory of 688 2224 ipconfig.exe 44 PID 2224 wrote to memory of 688 2224 ipconfig.exe 44 PID 2224 wrote to memory of 688 2224 ipconfig.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2752
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2620
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2804
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1972
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2856
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2580
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2644
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2588
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2536
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2528
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2548
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request for quotation- Enquiry No55.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:688
-
-