Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 08:09
Static task
static1
Behavioral task
behavioral1
Sample
Ordern de Compra 1662240.pdf.exe
Resource
win7-20240903-en
General
-
Target
Ordern de Compra 1662240.pdf.exe
-
Size
647KB
-
MD5
7ee3a5a28cdfddd13f881bfa0721608f
-
SHA1
8b6c176824206b8c821281a6c9fab76b07f444eb
-
SHA256
9b5e8c99db5b9a25c51d190a34c764dae1573ff0231e294cccbd74a708b1d0dc
-
SHA512
5e9468dd64167e308e2744d4e43accd84bf3b0ffb71b5c1fa9c93b7413978a591a167bbdc6441baa42faccc3c187fe57d662fc686059807b2703d1ecc2d8817a
-
SSDEEP
12288:CC5kuL5sl1uUpltxHyWh28aiiyCDQxK/3CdrTxCpjawHgXY0cvuH+xmj40:Co6l1uUXtxSWXaiXLd4r+YQH40
Malware Config
Extracted
formbook
4.1
s94p
akeimpact.xyz
obsters.online
lsnmarketing.info
mm789.xyz
lack-loan-1232998.fyi
aaafsaneh1.info
nsurance-59975.bond
itricboost.cloud
0011997.xyz
st3jr71.world
winkletown3.store
imhell.cyou
nfluencer-marketing-72763.bond
etirement-plans-42889.bond
ugar-test-lab-near-me.today
llseasoncleaning.net
ksoftware.info
lientfirst.xyz
aatahmineh-inter5.rest
lsolutions.xyz
atellite-internet-61132.bond
aescalculadora.store
atemydashboard.online
oddaddy.online
ngridvault.xyz
epossessed-cars-36600.bond
mail-marketing-job-mogul.world
reudi.online
ymailserver.xyz
asyshop.game
hoes-footwear-11061.bond
opraise.store
alki.xyz
nline-advertising-16312.bond
rightwork.xyz
arvelads.house
ommunity-zen.net
seachallangermode.world
ompucim.tech
rdcast.net
laim-zrc-token.xyz
ental-implants-80206.bond
styvd.xyz
econdplace.xyz
gf777.win
warajyaevents.xyz
regnancy-41897.bond
hieldantivirus.store
h311u8e.xyz
om-exchange-nft275665.sbs
leaning-services-28292.bond
b188grab.xyz
idrift.net
oo.capital
ybelu.art
ibrationtransmitters.net
qnalh.info
ybervirus.fun
oresbyholdingslimited.net
arity.xyz
irwickstore.store
nelearn.xyz
xyab.shop
olimec.xyz
ift-5417190.live
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4208-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4208-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3820-24-0x0000000000920000-0x000000000094F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4544 set thread context of 4208 4544 Ordern de Compra 1662240.pdf.exe 98 PID 4208 set thread context of 3360 4208 Ordern de Compra 1662240.pdf.exe 55 PID 3820 set thread context of 3360 3820 svchost.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ordern de Compra 1662240.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4544 Ordern de Compra 1662240.pdf.exe 4544 Ordern de Compra 1662240.pdf.exe 4544 Ordern de Compra 1662240.pdf.exe 4544 Ordern de Compra 1662240.pdf.exe 4208 Ordern de Compra 1662240.pdf.exe 4208 Ordern de Compra 1662240.pdf.exe 4208 Ordern de Compra 1662240.pdf.exe 4208 Ordern de Compra 1662240.pdf.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe 3820 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4208 Ordern de Compra 1662240.pdf.exe 4208 Ordern de Compra 1662240.pdf.exe 4208 Ordern de Compra 1662240.pdf.exe 3820 svchost.exe 3820 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4544 Ordern de Compra 1662240.pdf.exe Token: SeDebugPrivilege 4208 Ordern de Compra 1662240.pdf.exe Token: SeDebugPrivilege 3820 svchost.exe Token: SeShutdownPrivilege 3360 Explorer.EXE Token: SeCreatePagefilePrivilege 3360 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4544 wrote to memory of 868 4544 Ordern de Compra 1662240.pdf.exe 96 PID 4544 wrote to memory of 868 4544 Ordern de Compra 1662240.pdf.exe 96 PID 4544 wrote to memory of 868 4544 Ordern de Compra 1662240.pdf.exe 96 PID 4544 wrote to memory of 2796 4544 Ordern de Compra 1662240.pdf.exe 97 PID 4544 wrote to memory of 2796 4544 Ordern de Compra 1662240.pdf.exe 97 PID 4544 wrote to memory of 2796 4544 Ordern de Compra 1662240.pdf.exe 97 PID 4544 wrote to memory of 4208 4544 Ordern de Compra 1662240.pdf.exe 98 PID 4544 wrote to memory of 4208 4544 Ordern de Compra 1662240.pdf.exe 98 PID 4544 wrote to memory of 4208 4544 Ordern de Compra 1662240.pdf.exe 98 PID 4544 wrote to memory of 4208 4544 Ordern de Compra 1662240.pdf.exe 98 PID 4544 wrote to memory of 4208 4544 Ordern de Compra 1662240.pdf.exe 98 PID 4544 wrote to memory of 4208 4544 Ordern de Compra 1662240.pdf.exe 98 PID 3360 wrote to memory of 3820 3360 Explorer.EXE 99 PID 3360 wrote to memory of 3820 3360 Explorer.EXE 99 PID 3360 wrote to memory of 3820 3360 Explorer.EXE 99 PID 3820 wrote to memory of 2840 3820 svchost.exe 100 PID 3820 wrote to memory of 2840 3820 svchost.exe 100 PID 3820 wrote to memory of 2840 3820 svchost.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"3⤵PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"3⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ordern de Compra 1662240.pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-