Analysis
-
max time kernel
300s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 08:09
Static task
static1
Behavioral task
behavioral1
Sample
Ordern de Compra 1662240.pdf.exe
Resource
win7-20240903-en
General
-
Target
Ordern de Compra 1662240.pdf.exe
-
Size
647KB
-
MD5
7ee3a5a28cdfddd13f881bfa0721608f
-
SHA1
8b6c176824206b8c821281a6c9fab76b07f444eb
-
SHA256
9b5e8c99db5b9a25c51d190a34c764dae1573ff0231e294cccbd74a708b1d0dc
-
SHA512
5e9468dd64167e308e2744d4e43accd84bf3b0ffb71b5c1fa9c93b7413978a591a167bbdc6441baa42faccc3c187fe57d662fc686059807b2703d1ecc2d8817a
-
SSDEEP
12288:CC5kuL5sl1uUpltxHyWh28aiiyCDQxK/3CdrTxCpjawHgXY0cvuH+xmj40:Co6l1uUXtxSWXaiXLd4r+YQH40
Malware Config
Extracted
formbook
4.1
s94p
akeimpact.xyz
obsters.online
lsnmarketing.info
mm789.xyz
lack-loan-1232998.fyi
aaafsaneh1.info
nsurance-59975.bond
itricboost.cloud
0011997.xyz
st3jr71.world
winkletown3.store
imhell.cyou
nfluencer-marketing-72763.bond
etirement-plans-42889.bond
ugar-test-lab-near-me.today
llseasoncleaning.net
ksoftware.info
lientfirst.xyz
aatahmineh-inter5.rest
lsolutions.xyz
atellite-internet-61132.bond
aescalculadora.store
atemydashboard.online
oddaddy.online
ngridvault.xyz
epossessed-cars-36600.bond
mail-marketing-job-mogul.world
reudi.online
ymailserver.xyz
asyshop.game
hoes-footwear-11061.bond
opraise.store
alki.xyz
nline-advertising-16312.bond
rightwork.xyz
arvelads.house
ommunity-zen.net
seachallangermode.world
ompucim.tech
rdcast.net
laim-zrc-token.xyz
ental-implants-80206.bond
styvd.xyz
econdplace.xyz
gf777.win
warajyaevents.xyz
regnancy-41897.bond
hieldantivirus.store
h311u8e.xyz
om-exchange-nft275665.sbs
leaning-services-28292.bond
b188grab.xyz
idrift.net
oo.capital
ybelu.art
ibrationtransmitters.net
qnalh.info
ybervirus.fun
oresbyholdingslimited.net
arity.xyz
irwickstore.store
nelearn.xyz
xyab.shop
olimec.xyz
ift-5417190.live
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2628-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2628-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2628-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2984-27-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 532 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2824 set thread context of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 2628 set thread context of 1148 2628 Ordern de Compra 1662240.pdf.exe 20 PID 2628 set thread context of 1148 2628 Ordern de Compra 1662240.pdf.exe 20 PID 2984 set thread context of 1148 2984 cmd.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ordern de Compra 1662240.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2628 Ordern de Compra 1662240.pdf.exe 2628 Ordern de Compra 1662240.pdf.exe 2628 Ordern de Compra 1662240.pdf.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe 2984 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2628 Ordern de Compra 1662240.pdf.exe 2628 Ordern de Compra 1662240.pdf.exe 2628 Ordern de Compra 1662240.pdf.exe 2628 Ordern de Compra 1662240.pdf.exe 2984 cmd.exe 2984 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2628 Ordern de Compra 1662240.pdf.exe Token: SeDebugPrivilege 2984 cmd.exe Token: SeShutdownPrivilege 1148 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 2824 wrote to memory of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 2824 wrote to memory of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 2824 wrote to memory of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 2824 wrote to memory of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 2824 wrote to memory of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 2824 wrote to memory of 2628 2824 Ordern de Compra 1662240.pdf.exe 30 PID 1148 wrote to memory of 2984 1148 Explorer.EXE 31 PID 1148 wrote to memory of 2984 1148 Explorer.EXE 31 PID 1148 wrote to memory of 2984 1148 Explorer.EXE 31 PID 1148 wrote to memory of 2984 1148 Explorer.EXE 31 PID 2984 wrote to memory of 532 2984 cmd.exe 32 PID 2984 wrote to memory of 532 2984 cmd.exe 32 PID 2984 wrote to memory of 532 2984 cmd.exe 32 PID 2984 wrote to memory of 532 2984 cmd.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:532
-
-