Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 04:27
Static task
static1
Behavioral task
behavioral1
Sample
ORDER ENQIRY #093727664.exe
Resource
win7-20240903-en
General
-
Target
ORDER ENQIRY #093727664.exe
-
Size
1.3MB
-
MD5
6c307da605db691944e35458f2a5b772
-
SHA1
b89158e370a8658cf3a6ed2bb78925e004034905
-
SHA256
f65ec81dc8f5d0a0a1f53752cdc2bb933e2897a91091f28b8d1702ffe207481c
-
SHA512
2c3dc98e9850a509d30b556c5bbc0941735ef26cfcb45cf23392a1c9e23012dd46d9916792c5c559d5cb2a3b27b1d96bfdf7d89f9f1b01db7bfc2630b17dfe17
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aj1BV+opERjUD4TV3Y4M1:bTvC/MTQYxsWR7ajTkoUUwJY
Malware Config
Extracted
formbook
4.1
g49t
oast.now
11av1805.xyz
ourse.sale
nfoaldyfbvmdgfat.buzz
ntli.biz
apidrotation.net
ourmet94goodies.shop
eeksee.fun
aamahsa-emer6.rest
he-eyeofgod.online
ctofoot.net
ellnessdigitalmedia.store
0999yh.one
inghoki88.pro
sg.productions
basicwardrobe.club
itansofwisdom.fun
leaning-services-46734.bond
dinhk.online
arcelaamiga.shop
edicsanonymous.online
potloans.live
hermocontrol.xyz
arehouse-inventory-93551.bond
lockchain.xxx
om-tarewo.icu
ushmore.construction
rombeyond.xyz
epression-test-52238.bond
oiyter.xyz
etva.online
arbiequiz.shop
ransmediatupa.store
erali.rest
ox-packaging-jobs11.online
ebastianschlosser.xyz
hetrumpet.news
sefiorella.online
ifechanging.charity
5q04.net
jso.net
uantuminternship.online
bngy.shop
rabul.xyz
atxyzdes.live
ewrefope.xyz
dwardjrhuntley.online
erfectescapes.vacations
ntfqz.info
linds-curtains-47952.bond
nsidechina.online
ickanddrive.online
oisv.info
irro.mobi
eqiachat3.christmas
hampioon-slotss.vin
rilens.online
ydhl.life
ormuladedesconectar.shop
epression-test-87609.bond
asik-eye-surgery-90605.bond
raveheart2.online
tejarat.online
raftmine.xyz
radantobin.photography
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1688-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1688-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1688-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3508-16-0x0000000000640000-0x000000000066F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4020 set thread context of 1688 4020 ORDER ENQIRY #093727664.exe 83 PID 1688 set thread context of 3424 1688 svchost.exe 56 PID 1688 set thread context of 3424 1688 svchost.exe 56 PID 3508 set thread context of 3424 3508 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER ENQIRY #093727664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe 3508 cmmon32.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4020 ORDER ENQIRY #093727664.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 3508 cmmon32.exe 3508 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1688 svchost.exe Token: SeDebugPrivilege 3508 cmmon32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4020 ORDER ENQIRY #093727664.exe 4020 ORDER ENQIRY #093727664.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4020 ORDER ENQIRY #093727664.exe 4020 ORDER ENQIRY #093727664.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4020 wrote to memory of 1688 4020 ORDER ENQIRY #093727664.exe 83 PID 4020 wrote to memory of 1688 4020 ORDER ENQIRY #093727664.exe 83 PID 4020 wrote to memory of 1688 4020 ORDER ENQIRY #093727664.exe 83 PID 4020 wrote to memory of 1688 4020 ORDER ENQIRY #093727664.exe 83 PID 3424 wrote to memory of 3508 3424 Explorer.EXE 85 PID 3424 wrote to memory of 3508 3424 Explorer.EXE 85 PID 3424 wrote to memory of 3508 3424 Explorer.EXE 85 PID 3508 wrote to memory of 3264 3508 cmmon32.exe 86 PID 3508 wrote to memory of 3264 3508 cmmon32.exe 86 PID 3508 wrote to memory of 3264 3508 cmmon32.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQIRY #093727664.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-