Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
INV-7182234 PDF.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
INV-7182234 PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Purchase order 76353 ALtan.lnk
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Purchase order 76353 ALtan.lnk
Resource
win10v2004-20241007-en
General
-
Target
INV-7182234 PDF.exe
-
Size
713KB
-
MD5
62ff7b0794ea1490f930958e19d6a26b
-
SHA1
6af133db25d9f2183877f7b094fcda32828b30d3
-
SHA256
167bf768c164ac7181b18d6ce91cd51f7d3cd40470a8c8f67bb4a8e2bf00b65b
-
SHA512
4e923724d2890cdaa5f652d5fa12d31713f8e9dca9e18eb07e76c6679b1498c513b86b0f2d81a2a0c1905779f068655c889333252d4ac9714222aee42130d126
-
SSDEEP
12288:uXqgHEGTXTI86bB7o5qwTW7py12qk4h7zJdpDj2UnrbSmnCFdfZtL/wgGgOUBZqQ:uXqyE8s7tck6xP2UrbadZtp
Malware Config
Extracted
formbook
4.1
gc9
mahiroglunakliyat.xyz
zhonghemao.com
luxunwrapped.store
dchealthsolutions.com
smoothcupofjoe.com
lavmeantikuman.com
tryvlviscal.com
barefootwildbakery.com
anticoronapreventionshop.com
transactionreview.info
pierdapesoyganeplata.com
stella-tgsei-df-01.com
jagarnat.com
dadadongy.asia
streamload.xyz
lehighvalleytubing.com
happywife101.com
bitcominformatics.com
profxbenefits.com
djskitchenevents.com
lobanhotel.com
thejoybot.club
stringsxml.com
pageba.com
welodi.com
smitflex.com
shunkangld.com
cntzlc.com
jbrucebooks.com
erwan-faure.net
forsanalhayah.info
bcodeagency.com
flmdlmfdlflfldre.com
plumbing.solutions
mahikahealth.com
joelmartinsen.com
liangcorona.com
koito97.com
vanriel.net
theyad.com
dgwszjnmh.icu
chesapeakebaybabe.com
calibercreekfarm.com
exclucely.com
zuluice.com
homesteadrecordsrescue.com
vanferrc.com
hax-saim2.info
shcnxiangjiao.com
yren240.com
ngul-fo.com
eventsdonevirtually.com
liracenter.com
atulyamtours.com
metroncoin.com
esfihome.com
unfd.website
stopmoping.com
cryoem.world
7697vip12.com
jygraphics.com
7750120.com
tooyue8.com
accountableteamscoaching.com
hydreol.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4328-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4328-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/868-22-0x0000000000F90000-0x0000000000FBE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4380 set thread context of 4328 4380 INV-7182234 PDF.exe 91 PID 4328 set thread context of 3356 4328 INV-7182234 PDF.exe 56 PID 868 set thread context of 3356 868 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INV-7182234 PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 868 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 4380 INV-7182234 PDF.exe 4380 INV-7182234 PDF.exe 4380 INV-7182234 PDF.exe 4328 INV-7182234 PDF.exe 4328 INV-7182234 PDF.exe 4328 INV-7182234 PDF.exe 4328 INV-7182234 PDF.exe 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE 868 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4328 INV-7182234 PDF.exe 4328 INV-7182234 PDF.exe 4328 INV-7182234 PDF.exe 868 NETSTAT.EXE 868 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4380 INV-7182234 PDF.exe Token: SeDebugPrivilege 4328 INV-7182234 PDF.exe Token: SeDebugPrivilege 868 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4328 4380 INV-7182234 PDF.exe 91 PID 4380 wrote to memory of 4328 4380 INV-7182234 PDF.exe 91 PID 4380 wrote to memory of 4328 4380 INV-7182234 PDF.exe 91 PID 4380 wrote to memory of 4328 4380 INV-7182234 PDF.exe 91 PID 4380 wrote to memory of 4328 4380 INV-7182234 PDF.exe 91 PID 4380 wrote to memory of 4328 4380 INV-7182234 PDF.exe 91 PID 3356 wrote to memory of 868 3356 Explorer.EXE 100 PID 3356 wrote to memory of 868 3356 Explorer.EXE 100 PID 3356 wrote to memory of 868 3356 Explorer.EXE 100 PID 868 wrote to memory of 4884 868 NETSTAT.EXE 101 PID 868 wrote to memory of 4884 868 NETSTAT.EXE 101 PID 868 wrote to memory of 4884 868 NETSTAT.EXE 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1708
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1784
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2032
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3772
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1532
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3464
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1200
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3248
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INV-7182234 PDF.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-