Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order _SIP008.exe
Resource
win7-20241023-en
General
-
Target
Purchase order _SIP008.exe
-
Size
1.2MB
-
MD5
0f23b3dede5773a4da6e3f6869da28ad
-
SHA1
16b4fc729dc5b66381e710717acd7a226f0c631f
-
SHA256
3f4e8eda03283329f391e111c756f7b6ece4a9bc0d41672af8c1f09baf2b1cec
-
SHA512
5acc67f5cf49dcd7b50c5ef14cffa2990edc146f41ec5507f6d79476fa21026f3a5082b0f8d412153b4951e7f3f1172858705e0d7c582da79cffe88b37402f52
-
SSDEEP
24576:iAOcZXp03RQgAgCkLOMhc2e+Q+3mG2k1ny76RPGQFV0aBTjWFqwA5:ojRAgCk3clDmtGQFV9jWG
Malware Config
Extracted
formbook
4.1
mh76
healthgovcalottery.net
wenxinliao.com
rooterphd.com
bbobbo.one
american-mes-de-dezembro.xyz
mintager.com
thespecialtstore.com
wemakegreenhomes.com
occurandmental.xyz
fidelityrealtytitle.com
numerisat.asia
wearestallions.com
supxl.com
rajacumi.com
renaziv.online
blixtindustries.com
fjljq.com
exploretrivenicamping.com
authenticusspa.com
uucloud.press
conclaveraleighapts.com
moqaq.com
graphicressie.com
homebest.online
yisaco.com
thedrybonesareawakening.com
browardhomeappraisal.com
xn--agroisleos-09a.com
clinchrecovery.com
rekoladev.com
mlbl1.xyz
tunecaring.com
avconstant.com
chelseavictorioustravels.com
esrfy.xyz
frijolitoswey.com
zsfsidltd.com
natashasadler.com
kice1.xyz
drivemytrains.xyz
shopalthosa.xyz
merendri.com
yetkiliveznem7.xyz
milestonesconstruction.com
apparodeoexpos.com
momotou.xyz
chatkhoneh.com
cacconsults.com
kigif-indonesia.com
segurambiental.com
verynicegirls.com
curearrow.com
fdupcoffee.com
theclevergolfers.com
moushimonster.com
qdchuangyedaikuan.com
hopefortodayrecovery.com
wk6agoboyxg6.xyz
giybetfm.com
completedn.xyz
eluawastudio.com
legacysportsusatexas.com
comgmaik.com
intelsearchtech.com
northpierangling.info
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2848-71-0x0000000000400000-0x0000000000AEA000-memory.dmp formbook behavioral1/memory/2684-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2656-79-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 2856 gdvvbotbw.pif -
Loads dropped DLL 4 IoCs
pid Process 2344 Purchase order _SIP008.exe 2344 Purchase order _SIP008.exe 2344 Purchase order _SIP008.exe 2344 Purchase order _SIP008.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2856 set thread context of 2684 2856 gdvvbotbw.pif 32 PID 2856 set thread context of 2848 2856 gdvvbotbw.pif 31 PID 2848 set thread context of 1176 2848 RegSvcs.exe 21 PID 2684 set thread context of 1176 2684 RegSvcs.exe 21 PID 2656 set thread context of 1176 2656 netsh.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order _SIP008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdvvbotbw.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2684 RegSvcs.exe 2848 RegSvcs.exe 2848 RegSvcs.exe 2684 RegSvcs.exe 2656 netsh.exe 2660 cmmon32.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe 2656 netsh.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2848 RegSvcs.exe 2684 RegSvcs.exe 2848 RegSvcs.exe 2848 RegSvcs.exe 2684 RegSvcs.exe 2684 RegSvcs.exe 2656 netsh.exe 2656 netsh.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2848 RegSvcs.exe Token: SeDebugPrivilege 2684 RegSvcs.exe Token: SeDebugPrivilege 2656 netsh.exe Token: SeDebugPrivilege 2660 cmmon32.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2856 2344 Purchase order _SIP008.exe 30 PID 2344 wrote to memory of 2856 2344 Purchase order _SIP008.exe 30 PID 2344 wrote to memory of 2856 2344 Purchase order _SIP008.exe 30 PID 2344 wrote to memory of 2856 2344 Purchase order _SIP008.exe 30 PID 2344 wrote to memory of 2856 2344 Purchase order _SIP008.exe 30 PID 2344 wrote to memory of 2856 2344 Purchase order _SIP008.exe 30 PID 2344 wrote to memory of 2856 2344 Purchase order _SIP008.exe 30 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2684 2856 gdvvbotbw.pif 32 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 2856 wrote to memory of 2848 2856 gdvvbotbw.pif 31 PID 1176 wrote to memory of 2660 1176 Explorer.EXE 33 PID 1176 wrote to memory of 2660 1176 Explorer.EXE 33 PID 1176 wrote to memory of 2660 1176 Explorer.EXE 33 PID 1176 wrote to memory of 2660 1176 Explorer.EXE 33 PID 1176 wrote to memory of 2656 1176 Explorer.EXE 34 PID 1176 wrote to memory of 2656 1176 Explorer.EXE 34 PID 1176 wrote to memory of 2656 1176 Explorer.EXE 34 PID 1176 wrote to memory of 2656 1176 Explorer.EXE 34 PID 2656 wrote to memory of 2704 2656 netsh.exe 35 PID 2656 wrote to memory of 2704 2656 netsh.exe 35 PID 2656 wrote to memory of 2704 2656 netsh.exe 35 PID 2656 wrote to memory of 2704 2656 netsh.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Purchase order _SIP008.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order _SIP008.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\4_21\gdvvbotbw.pif"C:\Users\Admin\AppData\Local\Temp\4_21\gdvvbotbw.pif" dvcmoef.fhw3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD5c3aa83222a39f8f2f3bc9306ceb6ba48
SHA1e9019020fa3ae90698dd8a88bfdd2224ea8cfda3
SHA256219ea47b9fc665fadc098f6595658e707d81f8427ad8395cac17ed621f145019
SHA512708601e8e008f9cb7383f278d966425e6b79fda4dea811f571dacf47d1685749e955364ac949b7899f3698846241ba70ba030012e8fdea9e27f4396ce63729d8
-
Filesize
41KB
MD5b9b577b15b95a66c42e474acc0a32876
SHA1be1932c591413d65fb01a656b398c3c004c1cbfd
SHA256ccdc69fef237ecb4a3f21261d5310cd6bc19005cc4f0a071407bd5d3ccb4e9d6
SHA51219d3e4d20c5dd59dfa7424e62de53ee909b6f990c5338b2ae9eca912154c87e011a4d005a10c8d5130f8d9711ff4f3267db8732c10b4151010d4412d83b292ad
-
Filesize
906KB
MD5f28aa08788132e64db4b8918ee2430b1
SHA1ef32b1023a89dc36d7c5e98e22845fe87c5efef2
SHA256f99b9fc041c177f0bee2c82d09f451ef0833696111b1b37cbfff8c975232ece2
SHA512689cf6118061aa9e7d4b78118db99338aa767433df511610d471a989825a84a53119310248ed3870b10e48e77b47c429ef5a276dbc9c4ec53a7588e16093b50f