Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20240903-en
General
-
Target
New Order.exe
-
Size
930KB
-
MD5
72428a6ac37aef0e13873a0073d9c8ef
-
SHA1
3532378eefb34413d60e6d891e74ea4c26a82cab
-
SHA256
d4aeb9c4ddc4e76367bf99592f6f922336e21345833c44093deea1248a5fe844
-
SHA512
fc28fd26bccfea2290d3290575f0f49798abd2bb77a15b7af9817c1f929409847b9ee33f6e6229c39c1267d597d03c5f45824456e6edc05b481e1830ee0df5ac
-
SSDEEP
12288:i3csGI/cHv3QZJTpiHj3GqVP27dPPPIpFF1s+1gUth+qz5IZvmc4FTlhCKCMvd2U:i83QZJoD3GYgdfQhR5IZvkXnF
Malware Config
Extracted
formbook
4.1
odse
braedlifestyle.com
morganjohnsondesign.online
surup-v48.club
diypoolpaint.sydney
v-b7026-ghhh.space
vetyvar.com
lollydaisy.com
campsitesurvival.com
autocalibre.com
fusiontech3d.com
xn--udkog0cvez259c82sa.xyz
eccentricartist.com
jc-zg.com
wacwin.com
livehealthychoice.com
visijuara.com
phigsa.com
sabayawork.com
afcerd.com
joeyshousesessions.com
fancycn.com
fem-iam.com
sinopocasles.com
skypalaceportal.com
wqajecjeias.com
selfscienceslabs.com
workingtitle.agency
asianartsawards.com
healtyhouse.com
iloveme.life
espacioleiva.com
dac71047.com
soldbygenajohnson.com
motherhenscoop.com
polkadotcoins.com
muslimmediation.com
grub-groove.com
albertaeatsfood.com
mixedplaylists.com
miamimotorcycleshop.com
unegublog.com
generalssoccer.com
manhattanlandscapedesign.com
cuongnguyen3r2j.com
stonelodgeseniorliving.com
swissinternationaltrustb.com
novemento.club
bladesmts.com
espiaruncelular.net
talasoglufinans.com
sargeworld.com
newlifenowblog.com
sugaringpalms.com
xaoikevesesede.com
mintyline.com
paleonade.com
saharsaghi.com
kentchimney.com
whipitgudd.com
gmopst.com
likekopi.com
spoonproductions-catering.com
annotake.com
stm32heaven.com
guncelekspres.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4596-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4596-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation New Order.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4140 set thread context of 4596 4140 New Order.exe 93 PID 4596 set thread context of 3352 4596 RegSvcs.exe 56 PID 8 set thread context of 3352 8 chkdsk.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 4140 New Order.exe 4596 RegSvcs.exe 4596 RegSvcs.exe 4596 RegSvcs.exe 4596 RegSvcs.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe 8 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4596 RegSvcs.exe 4596 RegSvcs.exe 4596 RegSvcs.exe 8 chkdsk.exe 8 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4140 New Order.exe Token: SeDebugPrivilege 4596 RegSvcs.exe Token: SeDebugPrivilege 8 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4140 wrote to memory of 4748 4140 New Order.exe 91 PID 4140 wrote to memory of 4748 4140 New Order.exe 91 PID 4140 wrote to memory of 4748 4140 New Order.exe 91 PID 4140 wrote to memory of 4596 4140 New Order.exe 93 PID 4140 wrote to memory of 4596 4140 New Order.exe 93 PID 4140 wrote to memory of 4596 4140 New Order.exe 93 PID 4140 wrote to memory of 4596 4140 New Order.exe 93 PID 4140 wrote to memory of 4596 4140 New Order.exe 93 PID 4140 wrote to memory of 4596 4140 New Order.exe 93 PID 3352 wrote to memory of 8 3352 Explorer.EXE 95 PID 3352 wrote to memory of 8 3352 Explorer.EXE 95 PID 3352 wrote to memory of 8 3352 Explorer.EXE 95 PID 8 wrote to memory of 452 8 chkdsk.exe 96 PID 8 wrote to memory of 452 8 chkdsk.exe 96 PID 8 wrote to memory of 452 8 chkdsk.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gfwvJrxcf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4198.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2592
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50e142a016dd60220d43ba3e8777de516
SHA11cd11a11ab309631c7c7dba5fa31fb103a64ff37
SHA2565be3b313d1c021378120adbc8948486b682873351d28275e4e47877e56e071de
SHA5123ba75a9a71f5d3d4cbcabc2fb1954cd3d34eb82234068390af13bc5b747734ee5eea57ae931d8c7a488244f162f760a32304c1ae72e96067b28e06b6b8710b7d