Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
Equipment Order PDF.exe
Resource
win7-20240903-en
General
-
Target
Equipment Order PDF.exe
-
Size
635KB
-
MD5
b1153a5e677a218b7ee73a0b1e6573d4
-
SHA1
3d0e644bcdf9d5d535494c8e96d6713285975273
-
SHA256
dfd901c6a7557a020e384e1dd79ac634af24df3708c4b6c6e6e0cdb1b5aa93be
-
SHA512
68660abb06cc97cb6306b1dbd802f020a1d6fd8dad470b77c8f2842194708d25a4c47baa7e7fceaedd097b1dbf28b22fe0a30acab8c8d8e342d1b8649eabdf13
-
SSDEEP
12288:Q3wqLZcF9YvYrhclfn9Dkm7JqehWAY7uH:4PLZo2vYrhcfDkm1g6H
Malware Config
Extracted
formbook
4.1
sn2a
poczetkohina.xyz
themetaversehealthshoppe.com
herbarmonia.com
artifyjapan.com
wizeconcentrates.com
sewtf.com
astroturismolaestacion.com
catrinawilliamsphotography.com
healthroll.net
thefamoustee.com
agrabytes.com
confrontingantiblackracism.mobi
firstratebriefto-viewtoday.info
flooadgfrfactors.com
moodteach.com
rypxhbenef.sbs
metaera.store
jaliscofilatelico.com
bellamiscream.com
server873.online
tomatotoon13.xyz
adbfk.icu
bokningskoll.com
x-spike.com
oasishomesre.com
goldenbeegallery.com
empreendedorfh.website
lifeinwillowdale.com
chatbing.com
roofeshine.com
aglwv.icu
actionstar.net
jmgalleriesusa.net
metapati.com
p2emultiverse.com
jharkhandupdate.com
xn--o39a00am61a8jf89go0e.com
xiangshuijf.com
pitar.net
werkenbijagromec.com
daileydetail.com
utah-outdoor.com
giddyupcupcoffee.com
xj716.com
qualityfordevelopment.com
peaviso.site
virtualfarmgirl.com
gamergirlbsc.com
yourvhiclecare.com
dhaniproperties.com
adoutfit.com
jmaak.com
milkman.media
ruthlessrecord.com
uplacimatapi.xyz
ruzgartedarik.xyz
mahnbescheid-beantragen.net
afqic.icu
thesnpindonesia.com
deepakvs.com
futer.link
mxobo.com
xn--hu5b1lh2y.xn--mk1bu44c
aar.management
paymentback.xyz
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3428-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3428-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3428-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1168-74-0x00000000008E0000-0x000000000090F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5008 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Equipment Order PDF.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1648 set thread context of 3428 1648 Equipment Order PDF.exe 96 PID 3428 set thread context of 3468 3428 Equipment Order PDF.exe 56 PID 3428 set thread context of 3468 3428 Equipment Order PDF.exe 56 PID 1168 set thread context of 3468 1168 explorer.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Equipment Order PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1648 Equipment Order PDF.exe 1648 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 5008 powershell.exe 5008 powershell.exe 3428 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe 1168 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3428 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 3428 Equipment Order PDF.exe 1168 explorer.exe 1168 explorer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1648 Equipment Order PDF.exe Token: SeDebugPrivilege 3428 Equipment Order PDF.exe Token: SeDebugPrivilege 5008 powershell.exe Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeDebugPrivilege 1168 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1648 wrote to memory of 5008 1648 Equipment Order PDF.exe 93 PID 1648 wrote to memory of 5008 1648 Equipment Order PDF.exe 93 PID 1648 wrote to memory of 5008 1648 Equipment Order PDF.exe 93 PID 1648 wrote to memory of 3548 1648 Equipment Order PDF.exe 95 PID 1648 wrote to memory of 3548 1648 Equipment Order PDF.exe 95 PID 1648 wrote to memory of 3548 1648 Equipment Order PDF.exe 95 PID 1648 wrote to memory of 3428 1648 Equipment Order PDF.exe 96 PID 1648 wrote to memory of 3428 1648 Equipment Order PDF.exe 96 PID 1648 wrote to memory of 3428 1648 Equipment Order PDF.exe 96 PID 1648 wrote to memory of 3428 1648 Equipment Order PDF.exe 96 PID 1648 wrote to memory of 3428 1648 Equipment Order PDF.exe 96 PID 1648 wrote to memory of 3428 1648 Equipment Order PDF.exe 96 PID 3468 wrote to memory of 1168 3468 Explorer.EXE 97 PID 3468 wrote to memory of 1168 3468 Explorer.EXE 97 PID 3468 wrote to memory of 1168 3468 Explorer.EXE 97 PID 1168 wrote to memory of 4556 1168 explorer.exe 98 PID 1168 wrote to memory of 4556 1168 explorer.exe 98 PID 1168 wrote to memory of 4556 1168 explorer.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"3⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Equipment Order PDF.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82