Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
INV-7182234 PDF.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
INV-7182234 PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Purchase order 76353 ALtan.lnk
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Purchase order 76353 ALtan.lnk
Resource
win10v2004-20241007-en
General
-
Target
INV-7182234 PDF.exe
-
Size
713KB
-
MD5
62ff7b0794ea1490f930958e19d6a26b
-
SHA1
6af133db25d9f2183877f7b094fcda32828b30d3
-
SHA256
167bf768c164ac7181b18d6ce91cd51f7d3cd40470a8c8f67bb4a8e2bf00b65b
-
SHA512
4e923724d2890cdaa5f652d5fa12d31713f8e9dca9e18eb07e76c6679b1498c513b86b0f2d81a2a0c1905779f068655c889333252d4ac9714222aee42130d126
-
SSDEEP
12288:uXqgHEGTXTI86bB7o5qwTW7py12qk4h7zJdpDj2UnrbSmnCFdfZtL/wgGgOUBZqQ:uXqyE8s7tck6xP2UrbadZtp
Malware Config
Extracted
formbook
4.1
gc9
mahiroglunakliyat.xyz
zhonghemao.com
luxunwrapped.store
dchealthsolutions.com
smoothcupofjoe.com
lavmeantikuman.com
tryvlviscal.com
barefootwildbakery.com
anticoronapreventionshop.com
transactionreview.info
pierdapesoyganeplata.com
stella-tgsei-df-01.com
jagarnat.com
dadadongy.asia
streamload.xyz
lehighvalleytubing.com
happywife101.com
bitcominformatics.com
profxbenefits.com
djskitchenevents.com
lobanhotel.com
thejoybot.club
stringsxml.com
pageba.com
welodi.com
smitflex.com
shunkangld.com
cntzlc.com
jbrucebooks.com
erwan-faure.net
forsanalhayah.info
bcodeagency.com
flmdlmfdlflfldre.com
plumbing.solutions
mahikahealth.com
joelmartinsen.com
liangcorona.com
koito97.com
vanriel.net
theyad.com
dgwszjnmh.icu
chesapeakebaybabe.com
calibercreekfarm.com
exclucely.com
zuluice.com
homesteadrecordsrescue.com
vanferrc.com
hax-saim2.info
shcnxiangjiao.com
yren240.com
ngul-fo.com
eventsdonevirtually.com
liracenter.com
atulyamtours.com
metroncoin.com
esfihome.com
unfd.website
stopmoping.com
cryoem.world
7697vip12.com
jygraphics.com
7750120.com
tooyue8.com
accountableteamscoaching.com
hydreol.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2808-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2808-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2808-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1152-27-0x0000000000090000-0x00000000000BE000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1708 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1272 set thread context of 2808 1272 INV-7182234 PDF.exe 31 PID 2808 set thread context of 1200 2808 INV-7182234 PDF.exe 21 PID 2808 set thread context of 1200 2808 INV-7182234 PDF.exe 21 PID 1152 set thread context of 1200 1152 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INV-7182234 PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1272 INV-7182234 PDF.exe 1272 INV-7182234 PDF.exe 1272 INV-7182234 PDF.exe 2808 INV-7182234 PDF.exe 2808 INV-7182234 PDF.exe 2808 INV-7182234 PDF.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe 1152 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2808 INV-7182234 PDF.exe 2808 INV-7182234 PDF.exe 2808 INV-7182234 PDF.exe 2808 INV-7182234 PDF.exe 1152 cmstp.exe 1152 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1272 INV-7182234 PDF.exe Token: SeDebugPrivilege 2808 INV-7182234 PDF.exe Token: SeDebugPrivilege 1152 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2808 1272 INV-7182234 PDF.exe 31 PID 1272 wrote to memory of 2808 1272 INV-7182234 PDF.exe 31 PID 1272 wrote to memory of 2808 1272 INV-7182234 PDF.exe 31 PID 1272 wrote to memory of 2808 1272 INV-7182234 PDF.exe 31 PID 1272 wrote to memory of 2808 1272 INV-7182234 PDF.exe 31 PID 1272 wrote to memory of 2808 1272 INV-7182234 PDF.exe 31 PID 1272 wrote to memory of 2808 1272 INV-7182234 PDF.exe 31 PID 1200 wrote to memory of 1152 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1152 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1152 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1152 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1152 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1152 1200 Explorer.EXE 57 PID 1200 wrote to memory of 1152 1200 Explorer.EXE 57 PID 1152 wrote to memory of 1708 1152 cmstp.exe 58 PID 1152 wrote to memory of 1708 1152 cmstp.exe 58 PID 1152 wrote to memory of 1708 1152 cmstp.exe 58 PID 1152 wrote to memory of 1708 1152 cmstp.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3008
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2696
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2704
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2712
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2724
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2756
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2768
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1936
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2528
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2580
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3016
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2536
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2176
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2308
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1924
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1476
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1784
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:844
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:784
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:628
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1144
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2876
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2792
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2952
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2596
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1708
-
-