Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
Invoice and Quotation.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Invoice and Quotation.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
qxbcmmh.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
qxbcmmh.exe
Resource
win10v2004-20241007-en
General
-
Target
Invoice and Quotation.exe
-
Size
289KB
-
MD5
2e07da5fa7627362c6666c94210a40fe
-
SHA1
8fe040d7df872ae78e702f11827bd236a6201981
-
SHA256
c58e97524572e398ed81f73169c0fad3cbfd691761b997cf09be2a69ef5a6be0
-
SHA512
23af93e3f00ca661a33e03d1063b3c1fe9b974c62ef136233092153b7b9839e8a807bcdb24c3b079c0d28aa1909e0e543dbf102a569dfa846ceb1e9db095fe5a
-
SSDEEP
6144:owdWxpYqbDdleIkpq7pvzkh3p1YCuzcAGz7FGpxvFu20RCp93Nn0:YxpYqbDdleMdzktTYCuAAAilNphu
Malware Config
Extracted
formbook
4.1
g09e
flyinglarkgp.com
spiritsyncing.net
sushikreci.com
drssdup.com
mobileappsus.com
lvrcprbrisbane.com
nfjnwa.icu
ottenbruch.immo
strinosoft.com
portershoecollection.com
electriccarsus.com
lecai.icu
piplespnd.quest
talkrecords.com
lowcodeconnection.com
lastwagenfahrerjobshierorg.com
kpallman.com
dcrdr.com
chainalysisinfo.com
einayaa.com
ohroga.com
serayusumberrejeki.com
cocalimit.website
signatureglobalsector88a.info
2685xydh.com
alquimia13-20.club
nandinghl.com
profitsecrets.life
alisamatlovsky.com
hoverhalo.com
dezadrive.com
livehubnews.com
c4y-telemed.com
brittdigitalmedia.com
lawes-schuessel.com
rhythmandballin.com
vlekom.icu
rebelcapitol.com
heartenergywellness.net
christieeducation.com
wrightwaycontractors.com
servicepropertiestrust.com
demoliving.com
hb46276.icu
entertheexorcist.com
yonoka.info
villagesquarehaverhill.com
volemic.info
3littlestarslandscapellc.com
10906pickfordtjh.com
cleaneattz.com
wjiuyw.icu
sea5spartsdirect.com
afcvl.com
junctiontruck.com
rainbowmirror.art
mlm6.net
iconboavista.com
kare-kyun.com
blackoutpoets.com
nimgmengmv.com
16qin.icu
onebulypo.xyz
florifootprinttool.com
xn--skogysvenner-yjb.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2824-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2824-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3016-22-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2132 qxbcmmh.exe 2824 qxbcmmh.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 Invoice and Quotation.exe 2132 qxbcmmh.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2132 set thread context of 2824 2132 qxbcmmh.exe 32 PID 2824 set thread context of 1196 2824 qxbcmmh.exe 21 PID 3016 set thread context of 1196 3016 raserver.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Invoice and Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxbcmmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2824 qxbcmmh.exe 2824 qxbcmmh.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe 3016 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2824 qxbcmmh.exe 2824 qxbcmmh.exe 2824 qxbcmmh.exe 3016 raserver.exe 3016 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 qxbcmmh.exe Token: SeDebugPrivilege 3016 raserver.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2132 1916 Invoice and Quotation.exe 31 PID 1916 wrote to memory of 2132 1916 Invoice and Quotation.exe 31 PID 1916 wrote to memory of 2132 1916 Invoice and Quotation.exe 31 PID 1916 wrote to memory of 2132 1916 Invoice and Quotation.exe 31 PID 2132 wrote to memory of 2824 2132 qxbcmmh.exe 32 PID 2132 wrote to memory of 2824 2132 qxbcmmh.exe 32 PID 2132 wrote to memory of 2824 2132 qxbcmmh.exe 32 PID 2132 wrote to memory of 2824 2132 qxbcmmh.exe 32 PID 2132 wrote to memory of 2824 2132 qxbcmmh.exe 32 PID 2132 wrote to memory of 2824 2132 qxbcmmh.exe 32 PID 2132 wrote to memory of 2824 2132 qxbcmmh.exe 32 PID 1196 wrote to memory of 3016 1196 Explorer.EXE 33 PID 1196 wrote to memory of 3016 1196 Explorer.EXE 33 PID 1196 wrote to memory of 3016 1196 Explorer.EXE 33 PID 1196 wrote to memory of 3016 1196 Explorer.EXE 33 PID 3016 wrote to memory of 2748 3016 raserver.exe 34 PID 3016 wrote to memory of 2748 3016 raserver.exe 34 PID 3016 wrote to memory of 2748 3016 raserver.exe 34 PID 3016 wrote to memory of 2748 3016 raserver.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Invoice and Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Invoice and Quotation.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\qxbcmmh.exeC:\Users\Admin\AppData\Local\Temp\qxbcmmh.exe C:\Users\Admin\AppData\Local\Temp\cucpwml3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\qxbcmmh.exeC:\Users\Admin\AppData\Local\Temp\qxbcmmh.exe C:\Users\Admin\AppData\Local\Temp\cucpwml4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\qxbcmmh.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51b170c978765a651c824be0f1c1e486c
SHA1efff465225cba6bc49f377662fc6665258994e58
SHA256db2ac9ed9296e1dfd69e9cdd5539d21772fb135b49722b5e01f8c728c8f0ffaa
SHA512e34f4c522d8a57d3781bd61421a6574f6c236be7d5ce97590392129e76d2bae69b19c0c5e143c35211e59f89591bc4e58a48512714a8025e6ad0b98908517135
-
Filesize
211KB
MD5827020ced381e55262695f58f84f278f
SHA1ddc57871c40731903747162ae79bb9115b0838f2
SHA25644bf31710fb7db97cfd76c864473981b648a5d175ce3ef0186bf2d2ff9966a5a
SHA5129721ab681dd84abd526b36b99c59765903d9e635fe48d60c97fbea9428c0e332c72cb41bf90a73b3922170fda1b72e1ab838b27f2f19db8d898a566202ee0ede
-
Filesize
117KB
MD565facecea332bbb51b802e66b329eb18
SHA1019140dda8ec2d92fe2597c8949208a7ebe95c6e
SHA256c6935a83136101694625c5904af17387b6cf2a2a0b91ae394615e4d1fa61bb28
SHA512d9d241441345f5c2e0bbd9e41489d9907d5c722f030249fa0f8285c13c5b3c872a8805a8b673060cba16f72a4ad8feba3a1ffd93524930193fe08bbe443a3842