Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240903-en
General
-
Target
Purchase Order.exe
-
Size
1.2MB
-
MD5
4dd9b0d139a7c9618fa5344e6b1387f8
-
SHA1
53138f14140eb1c253e7985b8385e3853e5a5ac8
-
SHA256
73820e9bd81ce740a0a3ec45fe10749a64034aab5efbeb12adec9ebf46c0f2ba
-
SHA512
754b31faed9881071816f2f6a1cd1ae71cae4c0b0590dc22e44211fc2c33d436e62e0b9ac28881284f1e176bdc8ec414db165776391dfa7ba238baa301465ed3
-
SSDEEP
24576:tdbfh8PGaONqv3Dp2E4xGREkcMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM+MMMMK:vyPGaOgNfREkcMMMMMMMMMMMMMMMMMM+
Malware Config
Extracted
formbook
4.1
cmd
marksmanrealestate.com
weeiter.com
dimody.com
tufftech.pro
romber.info
2theothercurb.com
maskibeauty.com
kreativedough.com
adanacatering.com
wordzninja.com
testxyy.xyz
lifeafterbobby.com
sunsageherbs.com
dentoncountyattorneys.media
18176732933.com
fjhgllnrz.icu
cryptobankcustody.com
theinternetproducer.com
motinik.com
getcatickets.com
sarahkim.world
linhengdz.com
breadpdq.com
kocaelikiralikvinc.com
thecoldspoon.com
traumaremedies.com
sedekahbungkus.net
thegioidenlichthao.com
bigmoneyempire.com
cannwisdom.com
helpfromtheweb.com
xn--9iq23jv19bduo.net
goldmedalzoo.net
monkeyonmyback.club
wandabooks.com
karmasrebels.com
tonainy.com
passiveincomefact.com
mariachitierramiatoluca.com
growthdefi.com
sidotapnu.com
hi-techgps.net
aquafiannce.com
edscoronashield.com
kanto-kouju.com
venturecapitalistssummit.com
afterfivekids.com
appsafety.info
halawatfoods.com
thehtcc.net
atmebenessere.com
espritdejuriste.com
scholartsac.com
realtimeclass.com
tabupolitico.net
rosalinajonathan.com
rabo-aanvraag.space
commercialcleaningservices.pro
free-virtual-sex18.online
imagistor.com
fishermanimports.com
yesilcamhatiralari.com
outdoormedics.com
powertransnl.com
richardgraycabinetmaker.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1932-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1932-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Purchase Order.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Purchase Order.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Purchase Order.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Purchase Order.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Purchase Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Purchase Order.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2664 set thread context of 1932 2664 Purchase Order.exe 34 PID 1932 set thread context of 1188 1932 RegSvcs.exe 21 PID 2872 set thread context of 1188 2872 wlanext.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2664 Purchase Order.exe 2664 Purchase Order.exe 2664 Purchase Order.exe 2664 Purchase Order.exe 1932 RegSvcs.exe 1932 RegSvcs.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe 2872 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1932 RegSvcs.exe 1932 RegSvcs.exe 1932 RegSvcs.exe 2872 wlanext.exe 2872 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2664 Purchase Order.exe Token: SeDebugPrivilege 1932 RegSvcs.exe Token: SeDebugPrivilege 2872 wlanext.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1216 2664 Purchase Order.exe 32 PID 2664 wrote to memory of 1216 2664 Purchase Order.exe 32 PID 2664 wrote to memory of 1216 2664 Purchase Order.exe 32 PID 2664 wrote to memory of 1216 2664 Purchase Order.exe 32 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 2664 wrote to memory of 1932 2664 Purchase Order.exe 34 PID 1188 wrote to memory of 2872 1188 Explorer.EXE 62 PID 1188 wrote to memory of 2872 1188 Explorer.EXE 62 PID 1188 wrote to memory of 2872 1188 Explorer.EXE 62 PID 1188 wrote to memory of 2872 1188 Explorer.EXE 62 PID 2872 wrote to memory of 1960 2872 wlanext.exe 63 PID 2872 wrote to memory of 1960 2872 wlanext.exe 63 PID 2872 wrote to memory of 1960 2872 wlanext.exe 63 PID 2872 wrote to memory of 1960 2872 wlanext.exe 63
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OtKlDrIky" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8B8D.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1924
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2384
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2784
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:536
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:604
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2796
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1792
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2052
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2352
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1448
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1000
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1064
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2416
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:276
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2600
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2252
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2520
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1624
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1884
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2008
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1708
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1644
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1976
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:712
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2764
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2800
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2792
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51165b1dab2d92d757a8ca0238a15480d
SHA157b6268535f894dff393a50f2256ef8f075b3fa9
SHA25623d2940ab9f4fb53a3a36f6e4139457530ac5e37fdd6c3db325f9d26d7ee862e
SHA5128c43c328d1253e90a78f77d0a1954c9519a285c27448667db609eb2ed154eca3a2f5c7e8240de5f71471dab4fad3ebc848644733ad100a94b6d73cadb44253c0