Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 10:53
Static task
static1
Behavioral task
behavioral1
Sample
ORDER ENQIRY #093727664.exe
Resource
win7-20240903-en
General
-
Target
ORDER ENQIRY #093727664.exe
-
Size
1.3MB
-
MD5
6c307da605db691944e35458f2a5b772
-
SHA1
b89158e370a8658cf3a6ed2bb78925e004034905
-
SHA256
f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c
-
SHA512
2c3dc98e9850a509d30b556c5bbc0941735ef26cfcb45cf23392a1c9e23012dd46d9916792c5c559d5cb2a3b27b1d96bfdf7d89f9f1b01db7bfc2630b17dfe17
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aj1BV+opERjUD4TV3Y4M1:bTvC/MTQYxsWR7ajTkoUUwJY
Malware Config
Extracted
formbook
4.1
g49t
oast.now
11av1805.xyz
ourse.sale
nfoaldyfbvmdgfat.buzz
ntli.biz
apidrotation.net
ourmet94goodies.shop
eeksee.fun
aamahsa-emer6.rest
he-eyeofgod.online
ctofoot.net
ellnessdigitalmedia.store
0999yh.one
inghoki88.pro
sg.productions
basicwardrobe.club
itansofwisdom.fun
leaning-services-46734.bond
dinhk.online
arcelaamiga.shop
edicsanonymous.online
potloans.live
hermocontrol.xyz
arehouse-inventory-93551.bond
lockchain.xxx
om-tarewo.icu
ushmore.construction
rombeyond.xyz
epression-test-52238.bond
oiyter.xyz
etva.online
arbiequiz.shop
ransmediatupa.store
erali.rest
ox-packaging-jobs11.online
ebastianschlosser.xyz
hetrumpet.news
sefiorella.online
ifechanging.charity
5q04.net
jso.net
uantuminternship.online
bngy.shop
rabul.xyz
atxyzdes.live
ewrefope.xyz
dwardjrhuntley.online
erfectescapes.vacations
ntfqz.info
linds-curtains-47952.bond
nsidechina.online
ickanddrive.online
oisv.info
irro.mobi
eqiachat3.christmas
hampioon-slotss.vin
rilens.online
ydhl.life
ormuladedesconectar.shop
epression-test-87609.bond
asik-eye-surgery-90605.bond
raveheart2.online
tejarat.online
raftmine.xyz
radantobin.photography
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2652-3-0x00000000002B0000-0x00000000002DF000-memory.dmp formbook behavioral2/memory/2652-7-0x00000000002B0000-0x00000000002DF000-memory.dmp formbook behavioral2/memory/2652-11-0x00000000002B0000-0x00000000002DF000-memory.dmp formbook behavioral2/memory/1316-19-0x0000000000E30000-0x0000000000E5F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4612 set thread context of 2652 4612 ORDER ENQIRY #093727664.exe 82 PID 2652 set thread context of 3356 2652 svchost.exe 55 PID 2652 set thread context of 3356 2652 svchost.exe 55 PID 1316 set thread context of 3356 1316 wlanext.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER ENQIRY #093727664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe 1316 wlanext.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4612 ORDER ENQIRY #093727664.exe 4612 ORDER ENQIRY #093727664.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 1316 wlanext.exe 1316 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2652 svchost.exe Token: SeDebugPrivilege 1316 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4612 ORDER ENQIRY #093727664.exe 4612 ORDER ENQIRY #093727664.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4612 ORDER ENQIRY #093727664.exe 4612 ORDER ENQIRY #093727664.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2652 4612 ORDER ENQIRY #093727664.exe 82 PID 4612 wrote to memory of 2652 4612 ORDER ENQIRY #093727664.exe 82 PID 4612 wrote to memory of 2652 4612 ORDER ENQIRY #093727664.exe 82 PID 4612 wrote to memory of 2652 4612 ORDER ENQIRY #093727664.exe 82 PID 2652 wrote to memory of 1316 2652 svchost.exe 88 PID 2652 wrote to memory of 1316 2652 svchost.exe 88 PID 2652 wrote to memory of 1316 2652 svchost.exe 88 PID 1316 wrote to memory of 4972 1316 wlanext.exe 89 PID 1316 wrote to memory of 4972 1316 wlanext.exe 89 PID 1316 wrote to memory of 4972 1316 wlanext.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4972
-
-
-
-