Analysis
-
max time kernel
148s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Ordem de Compra.exe
Resource
win7-20241010-en
General
-
Target
Ordem de Compra.exe
-
Size
823KB
-
MD5
bc14d13f1d7d4299cb07aff24b039b07
-
SHA1
91d3595692f85beb86cbd70f89c0327c1484d423
-
SHA256
03f5b9544b3bb2db290e54dfe203f425374d973ac225df52a7cb29adc7998726
-
SHA512
85081d8863bdbaf8ea7f85f9e69f0c8ea9d7aa3c6bd3f144f421b6ef86302c6ce5a6dd96e87dc95e4b4d7e581ff969c1d98854f6d0b5963d67dcfbad9edf3a47
-
SSDEEP
12288:hjLGEbvQe+5cZO6OCAq2iNoRLgIRLu8lVY+96xZXgOCxAumyVnQWiEyJTwVdRDJ9:hjt1KtL3lVYpxZXgOCxJHQttTwfN
Malware Config
Extracted
formbook
4.1
fs8
deanpalm.net
dinu-living.com
setsomegoals.com
craftyfresh.email
cleantons.com
szysjfjx.com
shestakova.info
70skinstore.com
ampletrade.ltd
cmmcwomen.group
michinoeki-taka.com
auntoni.com
huochegw.com
abovekulture.com
gzjige.com
americastandproudagain.com
hobbyhousekennels.com
1020waterviewdrive.com
5927399.com
gabipareras.net
computercodecamp.com
kabu-work.com
haxings.online
protanny.com
yuejiaoxuan.com
chikachinwe.com
candidlyadulting.com
realtoday.net
highlandcelticart.com
airshotsus.com
ilnmdyqgl.icu
thelincolntondentist.net
lashvash.com
cozyhomecrate.com
altamirraonline.com
sgn98.com
bdcamp.com
housingneedanalysis.com
bijasani.com
spectrumtechnos.com
tranquiltouch2020.com
mugenkites.com
danasnjenovosti.com
cryptocurrency.wiki
mavangel.com
wilsonislandretreat.com
jerobelaustegui.com
skillsme.school
jusegalt.com
hpg.computer
ye-ya-jian.com
mackayadventurelodge.com
clevengerproperties.com
optimizedaerialsolutions.com
mohinisystem.com
secretary.store
wrightjusticesolicitors.com
time-to-dive.com
techyde.com
finopscert.com
affluentmentoring.com
fengye8.info
a8cpm.com
muellervieh.net
kumcal.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2976-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2976-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2704-27-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1048 set thread context of 2976 1048 Ordem de Compra.exe 31 PID 2976 set thread context of 1220 2976 RegSvcs.exe 21 PID 2704 set thread context of 1220 2704 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ordem de Compra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2976 RegSvcs.exe 2976 RegSvcs.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2976 RegSvcs.exe 2976 RegSvcs.exe 2976 RegSvcs.exe 2704 svchost.exe 2704 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2976 RegSvcs.exe Token: SeDebugPrivilege 2704 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2828 1048 Ordem de Compra.exe 29 PID 1048 wrote to memory of 2828 1048 Ordem de Compra.exe 29 PID 1048 wrote to memory of 2828 1048 Ordem de Compra.exe 29 PID 1048 wrote to memory of 2828 1048 Ordem de Compra.exe 29 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1048 wrote to memory of 2976 1048 Ordem de Compra.exe 31 PID 1220 wrote to memory of 2704 1220 Explorer.EXE 32 PID 1220 wrote to memory of 2704 1220 Explorer.EXE 32 PID 1220 wrote to memory of 2704 1220 Explorer.EXE 32 PID 1220 wrote to memory of 2704 1220 Explorer.EXE 32 PID 2704 wrote to memory of 1676 2704 svchost.exe 33 PID 2704 wrote to memory of 1676 2704 svchost.exe 33 PID 2704 wrote to memory of 1676 2704 svchost.exe 33 PID 2704 wrote to memory of 1676 2704 svchost.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Ordem de Compra.exe"C:\Users\Admin\AppData\Local\Temp\Ordem de Compra.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HOPHHQxYRGsD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9656.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9675f9fee46174c37ffa607a109c4f2
SHA13bd6e762a0bdee507af2873dcd88b31aeb63d30e
SHA25669d4503d447ff1a78e629d98ccdce0af2da131d35c2d7669a1bf71c7310d8570
SHA512200d4fc14dcadb182efe400c15c34828653a26daf512650d5985adf42a29e9566acf026491010f7aa845f0248e143b12e7d900c1486d362ba090ead6a27aad29