Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
0rderD4ER18jd.exe
Resource
win7-20240903-en
General
-
Target
0rderD4ER18jd.exe
-
Size
444KB
-
MD5
3e7db94077f8a289fe1676cd4bbc09ef
-
SHA1
dad79b2bdeea126658c5fcb0f42850589d6ce92d
-
SHA256
bd4d161a4d284fe71f101a6a68a3159a3cee958e42d53d1f140aeb1db52933f8
-
SHA512
c8e26baed0c72db6c2a8b2903fa9469b3e803ef0f4f58996f841a73f75705be79ee67ea2b4cc14ea4de528a67a32017880fb6647b64261b2fd301711806bbde6
-
SSDEEP
6144:AI3i64S3XFpZTY1piDh8pbDQRDRjEzEqUXHhkmTC0wNONnOQTAjyKz7dFHm3l/J6:Z3fs7DuljpqIhkiiNvQ0BTmbA1
Malware Config
Extracted
formbook
4.1
wt6
mdjbjsc.com
twosparrowslsbusiness.com
captipe.info
spirtofafrica.com
teacher4today.com
d9masks.com
americanveteransparks.com
originvinylvermont.com
lifeguardboat.net
neynunescuritiba.com
4activelife.xyz
tiniytie.com
schirmenworld.com
nogbeter.com
bikerm.com
higherpurposeproject.com
melloband.com
cremgrs.com
chengyuanwai.com
multiplewealthsecrets.com
77ren.com
freedomwonks.com
tastethe.cloud
busty-italian.com
bingowheels.com
asmarasefera.com
snusmumriken.net
elearningdidatticaadistanza.com
tropicpendants.com
59dzb.com
hopitaldefrance.club
huanxifaka.com
precisioncoffeetools.com
skinjunkyph.com
littlebitlessrisky.com
freethegameboy.info
justiciaabogados.com
harumiyamanaka.com
alexisbekker.com
elzurrondgs.com
becurious.cloud
laeducacionadistancia.com
qualimproov.com
tregroespantry.com
la-voix-des-anges.com
supertron.online
5895hwy93s.com
eliosglaucoma.com
home-business-wealth.com
5gusaphones.com
sweetpeashihtzu.com
mrhadick.com
pizzeriavogelgryff.com
paraneon.com
massagecenterinkarama.com
votececilia.com
krcarts.com
shalagreen20yahoo.com
bird182trading.com
gjjt2019.com
casperbackup.net
usquite.site
postalpoet.com
oneagencyinc.com
ithomar.info
Signatures
-
Formbook family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 0rderD4ER18jd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0rderD4ER18jd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0rderD4ER18jd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0rderD4ER18jd.exe -
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2720-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2720-27-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 0rderD4ER18jd.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 0rderD4ER18jd.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0rderD4ER18jd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0rderD4ER18jd.exe -
Deletes itself 1 IoCs
pid Process 2980 cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 0rderD4ER18jd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0rderD4ER18jd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0rderD4ER18jd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0rderD4ER18jd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2204 set thread context of 2720 2204 0rderD4ER18jd.exe 35 PID 2720 set thread context of 1216 2720 0rderD4ER18jd.exe 21 PID 2572 set thread context of 1216 2572 mstsc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0rderD4ER18jd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1548 powershell.exe 2204 0rderD4ER18jd.exe 2204 0rderD4ER18jd.exe 2204 0rderD4ER18jd.exe 2204 0rderD4ER18jd.exe 2720 0rderD4ER18jd.exe 2720 0rderD4ER18jd.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe 2572 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2720 0rderD4ER18jd.exe 2720 0rderD4ER18jd.exe 2720 0rderD4ER18jd.exe 2572 mstsc.exe 2572 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 2204 0rderD4ER18jd.exe Token: SeDebugPrivilege 2720 0rderD4ER18jd.exe Token: SeDebugPrivilege 2572 mstsc.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1548 2204 0rderD4ER18jd.exe 30 PID 2204 wrote to memory of 1548 2204 0rderD4ER18jd.exe 30 PID 2204 wrote to memory of 1548 2204 0rderD4ER18jd.exe 30 PID 2204 wrote to memory of 1548 2204 0rderD4ER18jd.exe 30 PID 2204 wrote to memory of 2800 2204 0rderD4ER18jd.exe 33 PID 2204 wrote to memory of 2800 2204 0rderD4ER18jd.exe 33 PID 2204 wrote to memory of 2800 2204 0rderD4ER18jd.exe 33 PID 2204 wrote to memory of 2800 2204 0rderD4ER18jd.exe 33 PID 2204 wrote to memory of 860 2204 0rderD4ER18jd.exe 34 PID 2204 wrote to memory of 860 2204 0rderD4ER18jd.exe 34 PID 2204 wrote to memory of 860 2204 0rderD4ER18jd.exe 34 PID 2204 wrote to memory of 860 2204 0rderD4ER18jd.exe 34 PID 2204 wrote to memory of 2720 2204 0rderD4ER18jd.exe 35 PID 2204 wrote to memory of 2720 2204 0rderD4ER18jd.exe 35 PID 2204 wrote to memory of 2720 2204 0rderD4ER18jd.exe 35 PID 2204 wrote to memory of 2720 2204 0rderD4ER18jd.exe 35 PID 2204 wrote to memory of 2720 2204 0rderD4ER18jd.exe 35 PID 2204 wrote to memory of 2720 2204 0rderD4ER18jd.exe 35 PID 2204 wrote to memory of 2720 2204 0rderD4ER18jd.exe 35 PID 1216 wrote to memory of 2572 1216 Explorer.EXE 36 PID 1216 wrote to memory of 2572 1216 Explorer.EXE 36 PID 1216 wrote to memory of 2572 1216 Explorer.EXE 36 PID 1216 wrote to memory of 2572 1216 Explorer.EXE 36 PID 2572 wrote to memory of 2980 2572 mstsc.exe 37 PID 2572 wrote to memory of 2980 2572 mstsc.exe 37 PID 2572 wrote to memory of 2980 2572 mstsc.exe 37 PID 2572 wrote to memory of 2980 2572 mstsc.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Windows security modification
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"3⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"3⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\0rderD4ER18jd.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2