Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
Nov.pdf.exe
Resource
win7-20241023-en
General
-
Target
Nov.pdf.exe
-
Size
634KB
-
MD5
406a8800ac851d7591b9faa57c7a540a
-
SHA1
62df23d861119dae068567ed47259c44a9121064
-
SHA256
714c331c290a9293ff62b5ef61add6cdc8d33043b2290c4e422f18ade08a513a
-
SHA512
51e74669a8e11ac12409a61828d283747e20b9f439db9da158232a44c7ca9aff6d2aafa8506791566e03df44c36251b612daa9a8dd0eebeadc6ee338ed2a3ffa
-
SSDEEP
12288:WBpCdKYpMlSGbv567mWTWwwjENXl+6vkMFfVIQZWaxyc0d1is:MMQYCSGb5cmqfwj61MMFfVIcycA4
Malware Config
Extracted
formbook
4.1
sqxs
creid-network.com
dinningatcastlehill.com
fundadilla.com
fashionmdeasy.com
magentos6.com
pushpartybdp.com
streamingnetwork.xyz
sevenredwalls.com
hsuehsun.space
leanbirthdaycake.com
rocketmortgagedeceit.com
cashflowdb.com
smilebringerdesign.com
naomicoleclinic.com
wingsforklift.com
newsounding.com
48hrbusinessrescue.pro
101osthoff456.com
attleticgreens.com
xx233.xyz
niziuantena.com
photosbyamandajdaniels.com
udharworld.com
astrolmass.com
wzht88.com
victoriasessionsheroes.com
thefuture101.com
sihe08.com
webingnar.com
influentialgood.com
jobdoctorplacements.com
bankrotstvostavropol.pro
gracefulfari.com
bluevistainvestments.com
poopertroopersct.com
link-glue.com
barbequeterie.com
ajbkscw.com
janek-sales-training.net
salesjump.xyz
whatthefountain.com
centre-pour-formation.com
aiocoin.net
thefreemaskstore.com
localwow.net
steven-ross.com
perennialhh.com
luxebeautylash.com
aswahorganic.com
businesshouse5asidejm.com
zowjain.com
mediatraining-toronto.com
ashtangaway.com
solutiirecentedemarketing.club
zgzuqw.com
timerma.com
aguaalcalinamexico.com
tacostio1.com
karitaz.com
bismillahbodyoil.com
c2p.life
kacgt.com
fastcincincinnatioffer.com
michaels.house
lovetarot.online
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/1828-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1828-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2032-31-0x00000000000D0000-0x00000000000FE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2124 set thread context of 1828 2124 Nov.pdf.exe 33 PID 1828 set thread context of 1208 1828 RegSvcs.exe 21 PID 2032 set thread context of 1208 2032 msiexec.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nov.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2124 Nov.pdf.exe 2124 Nov.pdf.exe 1828 RegSvcs.exe 2124 Nov.pdf.exe 1828 RegSvcs.exe 2032 msiexec.exe 2032 msiexec.exe 2032 msiexec.exe 2032 msiexec.exe 2032 msiexec.exe 2032 msiexec.exe 2032 msiexec.exe 2032 msiexec.exe 2032 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1828 RegSvcs.exe 1828 RegSvcs.exe 1828 RegSvcs.exe 2032 msiexec.exe 2032 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2124 Nov.pdf.exe Token: SeDebugPrivilege 1828 RegSvcs.exe Token: SeDebugPrivilege 2032 msiexec.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2296 2124 Nov.pdf.exe 31 PID 2124 wrote to memory of 2296 2124 Nov.pdf.exe 31 PID 2124 wrote to memory of 2296 2124 Nov.pdf.exe 31 PID 2124 wrote to memory of 2296 2124 Nov.pdf.exe 31 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 2124 wrote to memory of 1828 2124 Nov.pdf.exe 33 PID 1208 wrote to memory of 2032 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2032 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2032 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2032 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2032 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2032 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2032 1208 Explorer.EXE 34 PID 2032 wrote to memory of 1160 2032 msiexec.exe 35 PID 2032 wrote to memory of 1160 2032 msiexec.exe 35 PID 2032 wrote to memory of 1160 2032 msiexec.exe 35 PID 2032 wrote to memory of 1160 2032 msiexec.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Nov.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Nov.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ynHpXzKuzkLW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp49CC.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f4cc5846987f839ed38585e9bdc48564
SHA1195c10e92d05d3a10e598b10ffe4236c3e29817f
SHA256105136e6f1654d2cb0491ddee5b1811b38974f918c9db61f4ec8d5039bb5b6a7
SHA512f3265d09824da87146c9654c9af40efceea44c4e000006162067b7da31528f66d76ef12668714d6d8cbb734c920c45fef69319be472d20a2bed84aeab730def2