Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Ordem de Compra.exe
Resource
win7-20241010-en
General
-
Target
Ordem de Compra.exe
-
Size
823KB
-
MD5
bc14d13f1d7d4299cb07aff24b039b07
-
SHA1
91d3595692f85beb86cbd70f89c0327c1484d423
-
SHA256
03f5b9544b3bb2db290e54dfe203f425374d973ac225df52a7cb29adc7998726
-
SHA512
85081d8863bdbaf8ea7f85f9e69f0c8ea9d7aa3c6bd3f144f421b6ef86302c6ce5a6dd96e87dc95e4b4d7e581ff969c1d98854f6d0b5963d67dcfbad9edf3a47
-
SSDEEP
12288:hjLGEbvQe+5cZO6OCAq2iNoRLgIRLu8lVY+96xZXgOCxAumyVnQWiEyJTwVdRDJ9:hjt1KtL3lVYpxZXgOCxJHQttTwfN
Malware Config
Extracted
formbook
4.1
fs8
deanpalm.net
dinu-living.com
setsomegoals.com
craftyfresh.email
cleantons.com
szysjfjx.com
shestakova.info
70skinstore.com
ampletrade.ltd
cmmcwomen.group
michinoeki-taka.com
auntoni.com
huochegw.com
abovekulture.com
gzjige.com
americastandproudagain.com
hobbyhousekennels.com
1020waterviewdrive.com
5927399.com
gabipareras.net
computercodecamp.com
kabu-work.com
haxings.online
protanny.com
yuejiaoxuan.com
chikachinwe.com
candidlyadulting.com
realtoday.net
highlandcelticart.com
airshotsus.com
ilnmdyqgl.icu
thelincolntondentist.net
lashvash.com
cozyhomecrate.com
altamirraonline.com
sgn98.com
bdcamp.com
housingneedanalysis.com
bijasani.com
spectrumtechnos.com
tranquiltouch2020.com
mugenkites.com
danasnjenovosti.com
cryptocurrency.wiki
mavangel.com
wilsonislandretreat.com
jerobelaustegui.com
skillsme.school
jusegalt.com
hpg.computer
ye-ya-jian.com
mackayadventurelodge.com
clevengerproperties.com
optimizedaerialsolutions.com
mohinisystem.com
secretary.store
wrightjusticesolicitors.com
time-to-dive.com
techyde.com
finopscert.com
affluentmentoring.com
fengye8.info
a8cpm.com
muellervieh.net
kumcal.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1908-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1908-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4956-29-0x0000000001270000-0x000000000129E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Ordem de Compra.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5104 set thread context of 1908 5104 Ordem de Compra.exe 93 PID 1908 set thread context of 3472 1908 RegSvcs.exe 56 PID 4956 set thread context of 3472 4956 raserver.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ordem de Compra.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 5104 Ordem de Compra.exe 1908 RegSvcs.exe 1908 RegSvcs.exe 1908 RegSvcs.exe 1908 RegSvcs.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe 4956 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1908 RegSvcs.exe 1908 RegSvcs.exe 1908 RegSvcs.exe 4956 raserver.exe 4956 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5104 Ordem de Compra.exe Token: SeDebugPrivilege 1908 RegSvcs.exe Token: SeDebugPrivilege 4956 raserver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4632 5104 Ordem de Compra.exe 91 PID 5104 wrote to memory of 4632 5104 Ordem de Compra.exe 91 PID 5104 wrote to memory of 4632 5104 Ordem de Compra.exe 91 PID 5104 wrote to memory of 1908 5104 Ordem de Compra.exe 93 PID 5104 wrote to memory of 1908 5104 Ordem de Compra.exe 93 PID 5104 wrote to memory of 1908 5104 Ordem de Compra.exe 93 PID 5104 wrote to memory of 1908 5104 Ordem de Compra.exe 93 PID 5104 wrote to memory of 1908 5104 Ordem de Compra.exe 93 PID 5104 wrote to memory of 1908 5104 Ordem de Compra.exe 93 PID 3472 wrote to memory of 4956 3472 Explorer.EXE 94 PID 3472 wrote to memory of 4956 3472 Explorer.EXE 94 PID 3472 wrote to memory of 4956 3472 Explorer.EXE 94 PID 4956 wrote to memory of 2064 4956 raserver.exe 95 PID 4956 wrote to memory of 2064 4956 raserver.exe 95 PID 4956 wrote to memory of 2064 4956 raserver.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\Ordem de Compra.exe"C:\Users\Admin\AppData\Local\Temp\Ordem de Compra.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HOPHHQxYRGsD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp69B2.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD520ca9280b28e46f2d3b1330f05525bb3
SHA12481ed54031ab1b54abb60ef5f86a6a1c745cfb1
SHA25694dca21f560f4e8fc3ad97498facc305b2aeee2cf36653693550a9dc1b25c27b
SHA51255fed936d9d91e828530da343c034b2d1434d23a6addb386ca0731c87864b09c0d9af403171ad7c2d08b22830bfaf150b3de31e476fa01bfb9a3bb951b266fa5