Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PROFORMA INVOICE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win10v2004-20241007-en
General
-
Target
PROFORMA INVOICE.exe
-
Size
638KB
-
MD5
a3b8d59430deef4d59ec0d47a60af449
-
SHA1
4cb4bef74a68cb9a55c8eed369a7beea317e3840
-
SHA256
1339a93d8ca9b03d1b55ce0d283da6d320bf04fc515a8259597c635901c821d0
-
SHA512
402f97692a312b8a70ea22e585f13c1c81336a1a7845202f2368622c1a1422b25f779778227f3ab4ddcd250cd496821486918a8e73f6d527c4262d827fc11474
-
SSDEEP
6144:uGi+jGL0og4dDiXYOg8XQ5iiRHTjO0gBzxRmpwCxkZ6W6q/Ba:A1JiXXngQEHTxgBzxmwckZ67q/Y
Malware Config
Extracted
formbook
4.1
a6hj
unlocking.solutions
porscheofac.com
alinadaubermont.com
firstcallindia.xyz
sanot.top
lamborghini.my.id
vbncbcbcncnbcnbcnbcncnb.net
firstclassescapes.com
bestblondehairstylist.com
cncdt.biz
finkeng.xyz
unitedbcttles.com
redbaby.store
redbaby.store
5donline.com
theonewayclothing.com
jgcenterpriseholdings.com
hairshackvb.com
thepunchypineapple.com
fm-conseils.fr
facebookismetaverse.com
ghsfi.com
stratum.online
sjogrenssisterhood.com
shardanrityaniketan.com
wellfargobc.com
sunrise.limited
metastudio.asia
alexa-rate.com
googlecomplaints.com
information-netflix.fr
venomboxing.com
torrbcta.xyz
bigappleacadey.com
leve-trade.com
flex.industries
dromersolutions.com
reschedulefedexparcel.com
betheonemore.com
madani.tv
strikeaposeboothco.com
xmsssm.com
agcocoorp.com
hubertdykiel.com
meta-manchesterunited.com
authservice-informasion.com
coolrepairsystem.com
autorepairstanton.com
citrix.holdings
tmarco.info
wifibudddy.sbs
austinrcp.com
profit1trust.us
sfms.us
shop6-amazon.com
googlemvrs.com
applerepairvaranasi.com
teslasmartglasses.com
liveonenightonly.net
homedepotsp.com
punchfirstbook.com
airstrom.online
usreonetwork.com
groupsxxxtoday.com
starbucksnegotiations.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/3016-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3016-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3016-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2964-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2108 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 PROFORMA INVOICE.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2180 set thread context of 3016 2180 PROFORMA INVOICE.exe 31 PID 3016 set thread context of 1208 3016 PROFORMA INVOICE.exe 21 PID 3016 set thread context of 1208 3016 PROFORMA INVOICE.exe 21 PID 2964 set thread context of 1208 2964 raserver.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROFORMA INVOICE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3016 PROFORMA INVOICE.exe 3016 PROFORMA INVOICE.exe 3016 PROFORMA INVOICE.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe 2964 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3016 PROFORMA INVOICE.exe 3016 PROFORMA INVOICE.exe 3016 PROFORMA INVOICE.exe 3016 PROFORMA INVOICE.exe 2964 raserver.exe 2964 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3016 PROFORMA INVOICE.exe Token: SeDebugPrivilege 2964 raserver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3016 2180 PROFORMA INVOICE.exe 31 PID 2180 wrote to memory of 3016 2180 PROFORMA INVOICE.exe 31 PID 2180 wrote to memory of 3016 2180 PROFORMA INVOICE.exe 31 PID 2180 wrote to memory of 3016 2180 PROFORMA INVOICE.exe 31 PID 2180 wrote to memory of 3016 2180 PROFORMA INVOICE.exe 31 PID 2180 wrote to memory of 3016 2180 PROFORMA INVOICE.exe 31 PID 2180 wrote to memory of 3016 2180 PROFORMA INVOICE.exe 31 PID 1208 wrote to memory of 2964 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2964 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2964 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2964 1208 Explorer.EXE 32 PID 2964 wrote to memory of 2108 2964 raserver.exe 33 PID 2964 wrote to memory of 2108 2964 raserver.exe 33 PID 2964 wrote to memory of 2108 2964 raserver.exe 33 PID 2964 wrote to memory of 2108 2964 raserver.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD545f315f24046abc7cbe07a0f08a500b4
SHA15fcbdb3743ac2497181bd800622b98033e0232bd
SHA256231d2605fc4ba8b8abed10831692542931ad6e7f647225376723cf385695f1bf
SHA512a2df0a846c508318eb0eee02921c7f345aaaed5fcc25bee179eb092586c145b8348fb232a22a349fe2bcfa9166778c5812062ce89782d7f8fb2de56497f10a31