Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
Profoma Invoice _568432.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Profoma Invoice _568432.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
svttgvela.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
svttgvela.exe
Resource
win10v2004-20241007-en
General
-
Target
Profoma Invoice _568432.exe
-
Size
527KB
-
MD5
054e0e3655b99a7bdf021829434d5ef0
-
SHA1
7b263ee8c787e893c776df4a97c3c1076e4d25cd
-
SHA256
27b5c6cd7f2f32176249bd457017b2fc1f021d49cd4b2699c49bf2f2519b60f9
-
SHA512
ed43f425c0d650869eb85c341584d60c2d479265bec770b370056a6ad3bc0828506d17706d248156e2ddc647431f899d49581f74cb267928fdc7c590c1b3cbde
-
SSDEEP
12288:rJSjhrSXUqnZ1olPw5YIMa1TrYRWjgnETy2ZRfW:tFX3foVw5XPnidETba
Malware Config
Extracted
formbook
4.1
g09e
flyinglarkgp.com
spiritsyncing.net
sushikreci.com
drssdup.com
mobileappsus.com
lvrcprbrisbane.com
nfjnwa.icu
ottenbruch.immo
strinosoft.com
portershoecollection.com
electriccarsus.com
lecai.icu
piplespnd.quest
talkrecords.com
lowcodeconnection.com
lastwagenfahrerjobshierorg.com
kpallman.com
dcrdr.com
chainalysisinfo.com
einayaa.com
ohroga.com
serayusumberrejeki.com
cocalimit.website
signatureglobalsector88a.info
2685xydh.com
alquimia13-20.club
nandinghl.com
profitsecrets.life
alisamatlovsky.com
hoverhalo.com
dezadrive.com
livehubnews.com
c4y-telemed.com
brittdigitalmedia.com
lawes-schuessel.com
rhythmandballin.com
vlekom.icu
rebelcapitol.com
heartenergywellness.net
christieeducation.com
wrightwaycontractors.com
servicepropertiestrust.com
demoliving.com
hb46276.icu
entertheexorcist.com
yonoka.info
villagesquarehaverhill.com
volemic.info
3littlestarslandscapellc.com
10906pickfordtjh.com
cleaneattz.com
wjiuyw.icu
sea5spartsdirect.com
afcvl.com
junctiontruck.com
rainbowmirror.art
mlm6.net
iconboavista.com
kare-kyun.com
blackoutpoets.com
nimgmengmv.com
16qin.icu
onebulypo.xyz
florifootprinttool.com
xn--skogysvenner-yjb.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2596-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2596-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2876-22-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2960 svttgvela.exe 2596 svttgvela.exe -
Loads dropped DLL 2 IoCs
pid Process 584 Profoma Invoice _568432.exe 2960 svttgvela.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2960 set thread context of 2596 2960 svttgvela.exe 31 PID 2596 set thread context of 1364 2596 svttgvela.exe 21 PID 2876 set thread context of 1364 2876 wuapp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Profoma Invoice _568432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svttgvela.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuapp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2596 svttgvela.exe 2596 svttgvela.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe 2876 wuapp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2596 svttgvela.exe 2596 svttgvela.exe 2596 svttgvela.exe 2876 wuapp.exe 2876 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2596 svttgvela.exe Token: SeDebugPrivilege 2876 wuapp.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 584 wrote to memory of 2960 584 Profoma Invoice _568432.exe 29 PID 584 wrote to memory of 2960 584 Profoma Invoice _568432.exe 29 PID 584 wrote to memory of 2960 584 Profoma Invoice _568432.exe 29 PID 584 wrote to memory of 2960 584 Profoma Invoice _568432.exe 29 PID 2960 wrote to memory of 2596 2960 svttgvela.exe 31 PID 2960 wrote to memory of 2596 2960 svttgvela.exe 31 PID 2960 wrote to memory of 2596 2960 svttgvela.exe 31 PID 2960 wrote to memory of 2596 2960 svttgvela.exe 31 PID 2960 wrote to memory of 2596 2960 svttgvela.exe 31 PID 2960 wrote to memory of 2596 2960 svttgvela.exe 31 PID 2960 wrote to memory of 2596 2960 svttgvela.exe 31 PID 1364 wrote to memory of 2876 1364 Explorer.EXE 32 PID 1364 wrote to memory of 2876 1364 Explorer.EXE 32 PID 1364 wrote to memory of 2876 1364 Explorer.EXE 32 PID 1364 wrote to memory of 2876 1364 Explorer.EXE 32 PID 1364 wrote to memory of 2876 1364 Explorer.EXE 32 PID 1364 wrote to memory of 2876 1364 Explorer.EXE 32 PID 1364 wrote to memory of 2876 1364 Explorer.EXE 32 PID 2876 wrote to memory of 2860 2876 wuapp.exe 33 PID 2876 wrote to memory of 2860 2876 wuapp.exe 33 PID 2876 wrote to memory of 2860 2876 wuapp.exe 33 PID 2876 wrote to memory of 2860 2876 wuapp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Profoma Invoice _568432.exe"C:\Users\Admin\AppData\Local\Temp\Profoma Invoice _568432.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\svttgvela.exeC:\Users\Admin\AppData\Local\Temp\svttgvela.exe C:\Users\Admin\AppData\Local\Temp\oeyxqir3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\svttgvela.exeC:\Users\Admin\AppData\Local\Temp\svttgvela.exe C:\Users\Admin\AppData\Local\Temp\oeyxqir4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\svttgvela.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD55e5d5c45d6343c13672603095bcb3310
SHA1767e85e7d68e1f2fc39eac3417dd8b011756ad6a
SHA2566a9ae755ba7601f3bc33338f85c76b9c5c1c0f6710b96d01e6f70fdb7211e5f0
SHA5127265cc8c92fddd5553e50ce2c04cd835e7a215816e3c53f6dccf103c91e27be0896fc6cbd45126cf55ca03d8da462f611048e265e87482ba432b9b980afdb419
-
Filesize
5KB
MD5571af5ca739d87a859f150f9b4894057
SHA1905165fbeb2cf556877e3050fc9bfe42081abd20
SHA2560d6a046a8ebb8623da63e94b3792d213c19ff8545d00bee2425b7ef2ba7f515c
SHA5126dc654355195ecc6d88bc13b0c9276d486459139f0c6aa1476f30d0466329bcdcc3ab34999adfc671564fc92fc0208f351712f86856518b9884d7c3e004f5aea
-
Filesize
118KB
MD5c627aca7ccf84f92622c5f83da4190ba
SHA183d7c0310e6e6c97cbdfea8fc0cbd2fee697fb5e
SHA2564c166ca71399d8dd2cc895d0892dbf28ea2b5d883b6e310be7db76cf2d16066b
SHA512465504c77cad06a7047e25aef1b5e351aff88bfea46cb848dc391e782d8c7f535be9379475645264574fe34f302a4d08ac92c801a568b54dd92cc63158cbb3bc