Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
Nov.pdf.exe
Resource
win7-20241023-en
General
-
Target
Nov.pdf.exe
-
Size
634KB
-
MD5
406a8800ac851d7591b9faa57c7a540a
-
SHA1
62df23d861119dae068567ed47259c44a9121064
-
SHA256
714c331c290a9293ff62b5ef61add6cdc8d33043b2290c4e422f18ade08a513a
-
SHA512
51e74669a8e11ac12409a61828d283747e20b9f439db9da158232a44c7ca9aff6d2aafa8506791566e03df44c36251b612daa9a8dd0eebeadc6ee338ed2a3ffa
-
SSDEEP
12288:WBpCdKYpMlSGbv567mWTWwwjENXl+6vkMFfVIQZWaxyc0d1is:MMQYCSGb5cmqfwj61MMFfVIcycA4
Malware Config
Extracted
formbook
4.1
sqxs
creid-network.com
dinningatcastlehill.com
fundadilla.com
fashionmdeasy.com
magentos6.com
pushpartybdp.com
streamingnetwork.xyz
sevenredwalls.com
hsuehsun.space
leanbirthdaycake.com
rocketmortgagedeceit.com
cashflowdb.com
smilebringerdesign.com
naomicoleclinic.com
wingsforklift.com
newsounding.com
48hrbusinessrescue.pro
101osthoff456.com
attleticgreens.com
xx233.xyz
niziuantena.com
photosbyamandajdaniels.com
udharworld.com
astrolmass.com
wzht88.com
victoriasessionsheroes.com
thefuture101.com
sihe08.com
webingnar.com
influentialgood.com
jobdoctorplacements.com
bankrotstvostavropol.pro
gracefulfari.com
bluevistainvestments.com
poopertroopersct.com
link-glue.com
barbequeterie.com
ajbkscw.com
janek-sales-training.net
salesjump.xyz
whatthefountain.com
centre-pour-formation.com
aiocoin.net
thefreemaskstore.com
localwow.net
steven-ross.com
perennialhh.com
luxebeautylash.com
aswahorganic.com
businesshouse5asidejm.com
zowjain.com
mediatraining-toronto.com
ashtangaway.com
solutiirecentedemarketing.club
zgzuqw.com
timerma.com
aguaalcalinamexico.com
tacostio1.com
karitaz.com
bismillahbodyoil.com
c2p.life
kacgt.com
fastcincincinnatioffer.com
michaels.house
lovetarot.online
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1928-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1928-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1920-28-0x0000000000850000-0x000000000087E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Nov.pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1512 set thread context of 1928 1512 Nov.pdf.exe 93 PID 1928 set thread context of 3496 1928 RegSvcs.exe 56 PID 1920 set thread context of 3496 1920 cmd.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nov.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1512 Nov.pdf.exe 1512 Nov.pdf.exe 1512 Nov.pdf.exe 1512 Nov.pdf.exe 1928 RegSvcs.exe 1928 RegSvcs.exe 1928 RegSvcs.exe 1928 RegSvcs.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe 1920 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1928 RegSvcs.exe 1928 RegSvcs.exe 1928 RegSvcs.exe 1920 cmd.exe 1920 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1512 Nov.pdf.exe Token: SeDebugPrivilege 1928 RegSvcs.exe Token: SeDebugPrivilege 1920 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2000 1512 Nov.pdf.exe 91 PID 1512 wrote to memory of 2000 1512 Nov.pdf.exe 91 PID 1512 wrote to memory of 2000 1512 Nov.pdf.exe 91 PID 1512 wrote to memory of 1928 1512 Nov.pdf.exe 93 PID 1512 wrote to memory of 1928 1512 Nov.pdf.exe 93 PID 1512 wrote to memory of 1928 1512 Nov.pdf.exe 93 PID 1512 wrote to memory of 1928 1512 Nov.pdf.exe 93 PID 1512 wrote to memory of 1928 1512 Nov.pdf.exe 93 PID 1512 wrote to memory of 1928 1512 Nov.pdf.exe 93 PID 3496 wrote to memory of 1920 3496 Explorer.EXE 94 PID 3496 wrote to memory of 1920 3496 Explorer.EXE 94 PID 3496 wrote to memory of 1920 3496 Explorer.EXE 94 PID 1920 wrote to memory of 2128 1920 cmd.exe 95 PID 1920 wrote to memory of 2128 1920 cmd.exe 95 PID 1920 wrote to memory of 2128 1920 cmd.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\Nov.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Nov.pdf.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ynHpXzKuzkLW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4210.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aae15f3e0ba3171cccb11e3613627b3b
SHA1e22d80810c454d10a6d34e0ac7fd06f94bc2d62c
SHA2561092c97f710b466b46ec81838d776ac0e3d68b448549b02dbd537bff8462408f
SHA5127f23a74e9ee05b6dd1b7423484af64af8891232585ac44801808fb59c120960f415515ac938ead43f8efdc5cb79385e7e11c471ab7f7cb513c22dc9de12f13d5