Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
inv300123.pdf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
inv300123.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nqdipsrotb.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nqdipsrotb.dll
Resource
win10v2004-20241007-en
General
-
Target
inv300123.pdf.exe
-
Size
249KB
-
MD5
c1d715af9940a5e70e1ab58fecc18dba
-
SHA1
a223f8c86b1748e3f7bccccd13c864507505e09c
-
SHA256
3b49db8324bc576c3d9e31d4bd1c27af48f3ec36652b95991a3b4803c6a48ad8
-
SHA512
99fef3200ab3cf200a4d23ed95edbbc7005b856b599a2b832bedf9cb16ffc62dc6f5bc6c073a95e3f473b055621e4e022801c72ff4c0ab818253fdba59cafd53
-
SSDEEP
6144:wBlL/c/QkZXt5dYUpKdCASZEJsfgnv1KhsiGcO3:CezZJ7pDhZEJggnNceH3
Malware Config
Extracted
formbook
4.1
s3dy
ravlygte.info
marketnewsville.online
flooring-envy.com
flavourhouston.com
donghohanghieunam.com
globleitsolutions.com
digitalgraphicarts.com
cupidbeautybar.com
cannavybes.com
negative-dsp.com
littledali.com
meltwatersoftware.info
blackdogland.com
danasales.com
mississippiscorecard.com
mainesmoker.com
sirenxinlilzixun.com
tychehang.com
gentciu.com
weckloltd.com
posy-socks.com
smp2kroya.com
clientacceleratorchallenge.com
erlacollection.com
027tvs.com
thisdw.com
nonosmell-store.site
underadress.com
principal.properties
ministyles123.com
readtohappiness.com
roostercollection.com
veteransinfrastructureparks.com
theminiverse.com
auto-expresss.club
ciaokitchenandbath.com
sbsfresh.com
onesheart111.com
artofquiet.info
atecwtec.com
scars-finder.online
luckbaanasset.com
vegaguzmanstudio.com
destinedtowander.com
genesaloe.info
shirewindowcleaning.com
dwadawdf001.com
mividaurbana.com
outsiders.house
secondhandcare.club
1031exchangeintoreit.com
zenyoustore.com
bahissikayetvar.net
platforms.trade
dasmusstduhaben.com
frankplex.design
thesiblingsoiree.com
18sdsd.com
oneninelacrosse.com
hdsllawfirm.com
rawrequest.com
jetsetterlifestyle.luxury
karenmendell.com
aspydad.com
livelifevibrantcourse.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2380-9-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2380-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2416 inv300123.pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2416 set thread context of 2380 2416 inv300123.pdf.exe 30 PID 2380 set thread context of 1208 2380 inv300123.pdf.exe 21 PID 2760 set thread context of 1208 2760 ipconfig.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inv300123.pdf.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2760 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2380 inv300123.pdf.exe 2380 inv300123.pdf.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe 2760 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2380 inv300123.pdf.exe 2380 inv300123.pdf.exe 2380 inv300123.pdf.exe 2760 ipconfig.exe 2760 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2380 inv300123.pdf.exe Token: SeDebugPrivilege 2760 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2380 2416 inv300123.pdf.exe 30 PID 2416 wrote to memory of 2380 2416 inv300123.pdf.exe 30 PID 2416 wrote to memory of 2380 2416 inv300123.pdf.exe 30 PID 2416 wrote to memory of 2380 2416 inv300123.pdf.exe 30 PID 2416 wrote to memory of 2380 2416 inv300123.pdf.exe 30 PID 2416 wrote to memory of 2380 2416 inv300123.pdf.exe 30 PID 2416 wrote to memory of 2380 2416 inv300123.pdf.exe 30 PID 1208 wrote to memory of 2760 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2760 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2760 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2760 1208 Explorer.EXE 31 PID 2760 wrote to memory of 2540 2760 ipconfig.exe 32 PID 2760 wrote to memory of 2540 2760 ipconfig.exe 32 PID 2760 wrote to memory of 2540 2760 ipconfig.exe 32 PID 2760 wrote to memory of 2540 2760 ipconfig.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD58ab953e111816f48fd4aab119809af53
SHA15ad3c9b13395ea5912bbff13746171a387f43979
SHA256cb989078f012a4f8f8fe2b0ee20790a792dc6f1968cb0bba55f654ffb3346c20
SHA51275b37e5fcc1994686eb91316ef45ec46e9ada54cbe985e9671c8e0d09a153ddb6bbfd2881dc278c6b351c6a022d1db6c33b6b7a7ce73b0eb4af5a84ca2e7e421