Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 04:27
Static task
static1
Behavioral task
behavioral1
Sample
ORDER ENQIRY #093727664.exe
Resource
win7-20240903-en
General
-
Target
ORDER ENQIRY #093727664.exe
-
Size
1.3MB
-
MD5
6c307da605db691944e35458f2a5b772
-
SHA1
b89158e370a8658cf3a6ed2bb78925e004034905
-
SHA256
f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c
-
SHA512
2c3dc98e9850a509d30b556c5bbc0941735ef26cfcb45cf23392a1c9e23012dd46d9916792c5c559d5cb2a3b27b1d96bfdf7d89f9f1b01db7bfc2630b17dfe17
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aj1BV+opERjUD4TV3Y4M1:bTvC/MTQYxsWR7ajTkoUUwJY
Malware Config
Extracted
formbook
4.1
g49t
oast.now
11av1805.xyz
ourse.sale
nfoaldyfbvmdgfat.buzz
ntli.biz
apidrotation.net
ourmet94goodies.shop
eeksee.fun
aamahsa-emer6.rest
he-eyeofgod.online
ctofoot.net
ellnessdigitalmedia.store
0999yh.one
inghoki88.pro
sg.productions
basicwardrobe.club
itansofwisdom.fun
leaning-services-46734.bond
dinhk.online
arcelaamiga.shop
edicsanonymous.online
potloans.live
hermocontrol.xyz
arehouse-inventory-93551.bond
lockchain.xxx
om-tarewo.icu
ushmore.construction
rombeyond.xyz
epression-test-52238.bond
oiyter.xyz
etva.online
arbiequiz.shop
ransmediatupa.store
erali.rest
ox-packaging-jobs11.online
ebastianschlosser.xyz
hetrumpet.news
sefiorella.online
ifechanging.charity
5q04.net
jso.net
uantuminternship.online
bngy.shop
rabul.xyz
atxyzdes.live
ewrefope.xyz
dwardjrhuntley.online
erfectescapes.vacations
ntfqz.info
linds-curtains-47952.bond
nsidechina.online
ickanddrive.online
oisv.info
irro.mobi
eqiachat3.christmas
hampioon-slotss.vin
rilens.online
ydhl.life
ormuladedesconectar.shop
epression-test-87609.bond
asik-eye-surgery-90605.bond
raveheart2.online
tejarat.online
raftmine.xyz
radantobin.photography
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/3008-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3008-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2892-12-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2944 set thread context of 3008 2944 ORDER ENQIRY #093727664.exe 31 PID 3008 set thread context of 1188 3008 svchost.exe 21 PID 2892 set thread context of 1188 2892 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER ENQIRY #093727664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3008 svchost.exe 3008 svchost.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe 2892 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2944 ORDER ENQIRY #093727664.exe 3008 svchost.exe 3008 svchost.exe 3008 svchost.exe 2892 msdt.exe 2892 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 svchost.exe Token: SeDebugPrivilege 2892 msdt.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2944 ORDER ENQIRY #093727664.exe 2944 ORDER ENQIRY #093727664.exe 1188 Explorer.EXE 1188 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2944 ORDER ENQIRY #093727664.exe 2944 ORDER ENQIRY #093727664.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3008 2944 ORDER ENQIRY #093727664.exe 31 PID 2944 wrote to memory of 3008 2944 ORDER ENQIRY #093727664.exe 31 PID 2944 wrote to memory of 3008 2944 ORDER ENQIRY #093727664.exe 31 PID 2944 wrote to memory of 3008 2944 ORDER ENQIRY #093727664.exe 31 PID 2944 wrote to memory of 3008 2944 ORDER ENQIRY #093727664.exe 31 PID 1188 wrote to memory of 2892 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2892 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2892 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2892 1188 Explorer.EXE 32 PID 2892 wrote to memory of 2408 2892 msdt.exe 33 PID 2892 wrote to memory of 2408 2892 msdt.exe 33 PID 2892 wrote to memory of 2408 2892 msdt.exe 33 PID 2892 wrote to memory of 2408 2892 msdt.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-