Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20240708-en
General
-
Target
New Order.exe
-
Size
952KB
-
MD5
4d09db613404aab1e08286b92cb94cc0
-
SHA1
1a5a37536041c0e3e9bf77cb2fe5e489452f59fa
-
SHA256
9ad55b6338e0f2a6d564db4ee5d05b275c07e09a02421e9a928f38e8fd16eda4
-
SHA512
c36e3b235711466bba189f80e4efef48b5d14a4150c5c18b437a9791392f65265b6e43990b0d38455855c7b06f0bede72a0e69b25245ee079b20fcb48bd42dc1
-
SSDEEP
24576:Lz9I1d/PAdDyV28FoTvqXdO3dx3cpmcF:P9IsDyVheTCSd+pmk
Malware Config
Extracted
formbook
4.1
odse
braedlifestyle.com
morganjohnsondesign.online
surup-v48.club
diypoolpaint.sydney
v-b7026-ghhh.space
vetyvar.com
lollydaisy.com
campsitesurvival.com
autocalibre.com
fusiontech3d.com
xn--udkog0cvez259c82sa.xyz
eccentricartist.com
jc-zg.com
wacwin.com
livehealthychoice.com
visijuara.com
phigsa.com
sabayawork.com
afcerd.com
joeyshousesessions.com
fancycn.com
fem-iam.com
sinopocasles.com
skypalaceportal.com
wqajecjeias.com
selfscienceslabs.com
workingtitle.agency
asianartsawards.com
healtyhouse.com
iloveme.life
espacioleiva.com
dac71047.com
soldbygenajohnson.com
motherhenscoop.com
polkadotcoins.com
muslimmediation.com
grub-groove.com
albertaeatsfood.com
mixedplaylists.com
miamimotorcycleshop.com
unegublog.com
generalssoccer.com
manhattanlandscapedesign.com
cuongnguyen3r2j.com
stonelodgeseniorliving.com
swissinternationaltrustb.com
novemento.club
bladesmts.com
espiaruncelular.net
talasoglufinans.com
sargeworld.com
newlifenowblog.com
sugaringpalms.com
xaoikevesesede.com
mintyline.com
paleonade.com
saharsaghi.com
kentchimney.com
whipitgudd.com
gmopst.com
likekopi.com
spoonproductions-catering.com
annotake.com
stm32heaven.com
guncelekspres.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2636-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2636-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2636-26-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2396 set thread context of 2636 2396 New Order.exe 34 PID 2636 set thread context of 1188 2636 RegSvcs.exe 21 PID 2636 set thread context of 1188 2636 RegSvcs.exe 21 PID 2212 set thread context of 1188 2212 netsh.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2396 New Order.exe 2396 New Order.exe 2396 New Order.exe 2636 RegSvcs.exe 2636 RegSvcs.exe 2636 RegSvcs.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe 2212 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2636 RegSvcs.exe 2636 RegSvcs.exe 2636 RegSvcs.exe 2636 RegSvcs.exe 2212 netsh.exe 2212 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2396 New Order.exe Token: SeDebugPrivilege 2636 RegSvcs.exe Token: SeDebugPrivilege 2212 netsh.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3004 2396 New Order.exe 31 PID 2396 wrote to memory of 3004 2396 New Order.exe 31 PID 2396 wrote to memory of 3004 2396 New Order.exe 31 PID 2396 wrote to memory of 3004 2396 New Order.exe 31 PID 2396 wrote to memory of 2700 2396 New Order.exe 33 PID 2396 wrote to memory of 2700 2396 New Order.exe 33 PID 2396 wrote to memory of 2700 2396 New Order.exe 33 PID 2396 wrote to memory of 2700 2396 New Order.exe 33 PID 2396 wrote to memory of 2700 2396 New Order.exe 33 PID 2396 wrote to memory of 2700 2396 New Order.exe 33 PID 2396 wrote to memory of 2700 2396 New Order.exe 33 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 2396 wrote to memory of 2636 2396 New Order.exe 34 PID 1188 wrote to memory of 2212 1188 Explorer.EXE 35 PID 1188 wrote to memory of 2212 1188 Explorer.EXE 35 PID 1188 wrote to memory of 2212 1188 Explorer.EXE 35 PID 1188 wrote to memory of 2212 1188 Explorer.EXE 35 PID 2212 wrote to memory of 1104 2212 netsh.exe 36 PID 2212 wrote to memory of 1104 2212 netsh.exe 36 PID 2212 wrote to memory of 1104 2212 netsh.exe 36 PID 2212 wrote to memory of 1104 2212 netsh.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EEjrKOWq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp65D5.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55e958495c77350276b10d68e817f9342
SHA1206e706c91d00c41359e6c679d18c4390353b798
SHA256908ae6d9374156b2f8bc923f16b5c873d29bebc767ed7de3409d4ec919c358fb
SHA512e3b1700dee9505ac44b1eaa7df020f4be52e7fe4b256f6daa3ba4f6a64e851c8b1e7e53df1d1ca1019b57143468b06fff4bf3ddc03adee04cd1bfbcfc8bb8b30