Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
Payment for New Order.exe
Resource
win7-20240903-en
General
-
Target
Payment for New Order.exe
-
Size
561KB
-
MD5
70cb834f18f6de7e4db435908a55fd5d
-
SHA1
6bb3eddc64b5960be38d7c285dbaf77d3afd65f3
-
SHA256
b942a8a8c29b7e6245285fb893a10994f97af37b33eef8579820376016ee021d
-
SHA512
6e459251840bcd1a130e0f9fe5a45b2b1378d093ae303dd5a20e158a621848dff0469923a1892d24b38a5958b2753541686aa1b78f74076cf7722eb01747b57b
-
SSDEEP
12288:ZiYoG8ydzKwiet0+P59l33Na9rKC8fY8Bbo/:ZVX8y7Nj5bU9rKFf5B2
Malware Config
Extracted
formbook
4.1
moc
filmecloud.com
xn--4y2bx6nu6b91cbwr.net
dekreatif.com
salesnksportswe.top
shsjazzy.com
pezoutlaw.com
himayauae.net
deonlimua.com
tepeyacmexicancafe.com
kondrdr.icu
yogawitheylem.com
venomancillary.com
jmcolegate.com
supernintendoxo.com
birdsbeesbatsandbutterflys.com
prontoinfissi.net
sellslikeschmidt.com
michaelforshort.com
eleventh-commandment.com
fixitdoc.info
darkkitchen.asia
9shab.net
cloudthinking.net
adgler.com
jianhui.asia
c-xlmm.com
kinerental.com
rotieren.com
hjdkms.com
sohoscents.com
pizzaoffdelivery.com
loveh8realestate.com
gatechaindex.com
circles-co.com
avrenue.com
nativeoutsourcers.com
fortbendwildliferemoval.com
tunnelsfocuses.store
margaretregan.com
soopiya.com
islams.xyz
thedailydeitz.com
sdsjp.com
w17rmns.club
everythingconnectors.com
ukrtrade.info
sarahharveyconsulting.com
dvext.cloud
smartsvillefarms.com
msfashionexport.com
capitalmarketfirm.com
jesussaysalllivesmatter.info
theluxuryloop.com
ventoop.com
poundcakecastle.com
wengpeople.com
uncoveringbeads.com
dby116.com
georgetteoni.com
hostvirtualtradeshow.com
dentalfortcollins.com
lamayzac.com
wwema.com
tameermisr.com
inxyro.info
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/3060-9-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/3060-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2112 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2968 set thread context of 3060 2968 Payment for New Order.exe 30 PID 3060 set thread context of 1188 3060 Payment for New Order.exe 21 PID 2640 set thread context of 1188 2640 cmd.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment for New Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2968 Payment for New Order.exe 2968 Payment for New Order.exe 2968 Payment for New Order.exe 3060 Payment for New Order.exe 3060 Payment for New Order.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe 2640 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3060 Payment for New Order.exe 3060 Payment for New Order.exe 3060 Payment for New Order.exe 2640 cmd.exe 2640 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2968 Payment for New Order.exe Token: SeDebugPrivilege 3060 Payment for New Order.exe Token: SeDebugPrivilege 2640 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3060 2968 Payment for New Order.exe 30 PID 2968 wrote to memory of 3060 2968 Payment for New Order.exe 30 PID 2968 wrote to memory of 3060 2968 Payment for New Order.exe 30 PID 2968 wrote to memory of 3060 2968 Payment for New Order.exe 30 PID 2968 wrote to memory of 3060 2968 Payment for New Order.exe 30 PID 2968 wrote to memory of 3060 2968 Payment for New Order.exe 30 PID 2968 wrote to memory of 3060 2968 Payment for New Order.exe 30 PID 1188 wrote to memory of 2640 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2640 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2640 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2640 1188 Explorer.EXE 31 PID 2640 wrote to memory of 2112 2640 cmd.exe 32 PID 2640 wrote to memory of 2112 2640 cmd.exe 32 PID 2640 wrote to memory of 2112 2640 cmd.exe 32 PID 2640 wrote to memory of 2112 2640 cmd.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Payment for New Order.exe"C:\Users\Admin\AppData\Local\Temp\Payment for New Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Payment for New Order.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment for New Order.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2112
-
-