Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 23:31
Static task
static1
Behavioral task
behavioral1
Sample
Report and Contract.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Report and Contract.rtf
Resource
win10v2004-20241007-en
General
-
Target
Report and Contract.rtf
-
Size
2.8MB
-
MD5
2020683c0740feb8c7a41ea70377b7fc
-
SHA1
326a0155051677653084e841125984b63b30666a
-
SHA256
3a0b5b12f26a4751964e2660ee62d20b192e00a044cd322f6867acfa25e341bc
-
SHA512
b550381f4874e6d0d5d8e7af708f4f122aacbcc1b29fbd7dd528751166591458f1bf2fc725714b2a771cd430a8a02a99999df4a5fa4ee3f277137f2bf7263431
-
SSDEEP
24576:l0wKl7r3ezbhrC+1J5nbVlvTagtZwAQd5CTkY7PGfk/sGvidzy5AghAoDmqaepIn:O
Malware Config
Extracted
formbook
4.1
c23e
chandu4u.com
jeniusbank.co.uk
electricridesboise.com
streetbriefs.com
mdcsweb.com
czsaj.com
hikz.net
vcel.co.uk
cosmeticsz.com
nickatkeson.com
nilas.fr
goodstaygetaway.co.uk
591easy.net
kryptonapps.com
heveany.com
londonphotoworkshops.co.uk
quique.website
cointwovte.com
foodmie.com
silverdropsofficial.com
sygbitpay.com
colibriads.com
chukwuebukastanley.com
ecologistique.co.uk
crawfordcastle.com
bloghealthandbeauty.com
slboxing.co.uk
arlocalhost.online
jantdeposu.online
cynitic.co.uk
sussexaestheticdentist.co.uk
savannapropertyservices.co.uk
klmleisuretours.com
teamen.tech
whitehawkproperties.com
thequeenclean.store
kswautobot.com
everyverse.net
freshnhellish.com
salisburypride.co.uk
kiaradininten.com
cyuugakukyoushi.com
809dispatchlogllc.com
dreamsmaking.com
stickybuttsbbq.com
viemon.online
barrystanner.com
aghype.site
onlineweed.xyz
xuemanzi.net
carpetcleaningmasterclass.co.uk
salamanderfire.co.uk
oilgascity.com
kingalfredmotorservices.co.uk
canlisohbetburada.xyz
reno-easycash.com
blossomsjb.co.uk
zgcjjy.com
congcunggibng.net
bautrocknung.xyz
andm2022.com
hiro138.xyz
kuboshiori.net
blog-host.online
in-vision.systems
Signatures
-
Formbook family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2864 created 300 2864 Client.exe 17 -
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2432-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2940-19-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 2864 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 CmD.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2864 set thread context of 2432 2864 Client.exe 36 PID 2432 set thread context of 1236 2432 notepad.exe 21 PID 2940 set thread context of 1236 2940 cmstp.exe 21 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EQNEDT32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CmD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe -
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2264 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2156 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2864 Client.exe 2864 Client.exe 2864 Client.exe 2864 Client.exe 2864 Client.exe 2432 notepad.exe 2432 notepad.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe 2940 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2432 notepad.exe 2432 notepad.exe 2432 notepad.exe 2940 cmstp.exe 2940 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2864 Client.exe Token: SeDebugPrivilege 2432 notepad.exe Token: SeDebugPrivilege 2940 cmstp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2156 WINWORD.EXE 2156 WINWORD.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2096 2264 EQNEDT32.EXE 31 PID 2264 wrote to memory of 2096 2264 EQNEDT32.EXE 31 PID 2264 wrote to memory of 2096 2264 EQNEDT32.EXE 31 PID 2264 wrote to memory of 2096 2264 EQNEDT32.EXE 31 PID 2096 wrote to memory of 2864 2096 CmD.exe 34 PID 2096 wrote to memory of 2864 2096 CmD.exe 34 PID 2096 wrote to memory of 2864 2096 CmD.exe 34 PID 2096 wrote to memory of 2864 2096 CmD.exe 34 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 2864 wrote to memory of 2432 2864 Client.exe 36 PID 1236 wrote to memory of 2940 1236 Explorer.EXE 37 PID 1236 wrote to memory of 2940 1236 Explorer.EXE 37 PID 1236 wrote to memory of 2940 1236 Explorer.EXE 37 PID 1236 wrote to memory of 2940 1236 Explorer.EXE 37 PID 1236 wrote to memory of 2940 1236 Explorer.EXE 37 PID 1236 wrote to memory of 2940 1236 Explorer.EXE 37 PID 1236 wrote to memory of 2940 1236 Explorer.EXE 37 PID 2940 wrote to memory of 2844 2940 cmstp.exe 38 PID 2940 wrote to memory of 2844 2940 cmstp.exe 38 PID 2940 wrote to memory of 2844 2940 cmstp.exe 38 PID 2940 wrote to memory of 2844 2940 cmstp.exe 38 PID 2156 wrote to memory of 2768 2156 WINWORD.EXE 40 PID 2156 wrote to memory of 2768 2156 WINWORD.EXE 40 PID 2156 wrote to memory of 2768 2156 WINWORD.EXE 40 PID 2156 wrote to memory of 2768 2156 WINWORD.EXE 40
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:300
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe /Processid:{0689A6C8-CA97-4357-8D1A-84C69E3E0DDD}2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Report and Contract.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2768
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\notepad.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- System Location Discovery: System Language Discovery
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\CmD.exeCmD.exe /C %tmp%\Client.exe AC2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe AC3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
967KB
MD59c34362093560a7ad77eb5dd9af9b3ad
SHA177aefb3928bbefc174ac437e59cc98ded796ba5e
SHA25626360323d6dfa0a549cd418f1f276e46213360439d6cb784abce4234fdcc2863
SHA5121fde2d5a99584f2f236199bc2e8f52db6405c1740c9bbe6dcaebb78a148c5a086dc8d4f3d0fb80bad2f2b7c0b91d3f2c59ec5ee04c7664a0677afd978af1b8f9