Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 11:38
Static task
static1
Behavioral task
behavioral1
Sample
z57novaordempdf.exe
Resource
win7-20240903-en
General
-
Target
z57novaordempdf.exe
-
Size
831KB
-
MD5
1389296f0946aea604c44a973f58f8c2
-
SHA1
9cba48137f602affcb479dad998a47b0ae0ff6b2
-
SHA256
fa3e852fa9dde2dde0c1e2254f81059f8c2f1088596e0fb9aa2e37583c26ead5
-
SHA512
62e60fd761804bbec0aa8be992b16d8cb1fd052ade0f877cf89f9ea4372f3768742957ab3fc84302a16039708738c4074e2f43972a048ff1d73d15cc33e8019f
-
SSDEEP
12288:UOUM8HrDxIVbZ1PbgdJZAFsaQAjX0hsdEwkZdxLT+YGxd:bUMme/1kZgtkKEwmdK
Malware Config
Extracted
formbook
4.1
g10y
oofingpro.xyz
sertc.xyz
toaas.xyz
appysnacks.store
julio.tech
nfluencer-marketing-67952.bond
rginine888.store
haampion-slotss.bet
anicajet.xyz
lumber-jobs-91014.bond
eartsandco.store
ctualiza.icu
iso23.vip
udihebohofficial.boats
lackt.xyz
ymonejohnsonart.online
dereji.info
msqdhccc3.shop
auptstadttarif.online
overebyvibes.online
ollywoodbets.video
alaworld.info
etitoken.xyz
andapick.cloud
utomation-tools-52953.bond
lseefupufi.info
bandoned-houses-51755.bond
w90vy3m.xyz
eritejardin.online
hongston.art
hecondocoop.net
amster-gamedev.fun
dg159.xyz
bison.net
nline-gaming-50823.bond
se-online.net
enxin.icu
cst.net
holesale-897.shop
etgpt.info
et7k.baby
eothesis.online
hipmongtop.one
otostuenti.info
ignin.fun
telli.xyz
uralta.net
eem.shop
etclcg.business
ingavpost.live
inhard.net
ustomkitchencabinets.today
2vl673d.shop
39660.pro
sortagim.net
ysilentbattle.online
81tf464d.shop
obcome.xyz
tagers.xyz
aelo.xyz
nfluencer-marketing-45855.bond
eacoastcompany.sbs
oo.engineer
elax.xyz
eautylab.fun
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2576-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2756-23-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2744 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1880 set thread context of 2576 1880 z57novaordempdf.exe 36 PID 2576 set thread context of 1196 2576 RegSvcs.exe 21 PID 2756 set thread context of 1196 2756 cmd.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z57novaordempdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1880 z57novaordempdf.exe 1880 z57novaordempdf.exe 1880 z57novaordempdf.exe 1880 z57novaordempdf.exe 2576 RegSvcs.exe 2576 RegSvcs.exe 2744 powershell.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2576 RegSvcs.exe 2576 RegSvcs.exe 2576 RegSvcs.exe 2756 cmd.exe 2756 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1880 z57novaordempdf.exe Token: SeDebugPrivilege 2576 RegSvcs.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2756 cmd.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2744 1880 z57novaordempdf.exe 31 PID 1880 wrote to memory of 2744 1880 z57novaordempdf.exe 31 PID 1880 wrote to memory of 2744 1880 z57novaordempdf.exe 31 PID 1880 wrote to memory of 2744 1880 z57novaordempdf.exe 31 PID 1880 wrote to memory of 2768 1880 z57novaordempdf.exe 32 PID 1880 wrote to memory of 2768 1880 z57novaordempdf.exe 32 PID 1880 wrote to memory of 2768 1880 z57novaordempdf.exe 32 PID 1880 wrote to memory of 2768 1880 z57novaordempdf.exe 32 PID 1880 wrote to memory of 2660 1880 z57novaordempdf.exe 35 PID 1880 wrote to memory of 2660 1880 z57novaordempdf.exe 35 PID 1880 wrote to memory of 2660 1880 z57novaordempdf.exe 35 PID 1880 wrote to memory of 2660 1880 z57novaordempdf.exe 35 PID 1880 wrote to memory of 2660 1880 z57novaordempdf.exe 35 PID 1880 wrote to memory of 2660 1880 z57novaordempdf.exe 35 PID 1880 wrote to memory of 2660 1880 z57novaordempdf.exe 35 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1880 wrote to memory of 2576 1880 z57novaordempdf.exe 36 PID 1196 wrote to memory of 2756 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2756 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2756 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2756 1196 Explorer.EXE 37 PID 2756 wrote to memory of 2928 2756 cmd.exe 38 PID 2756 wrote to memory of 2928 2756 cmd.exe 38 PID 2756 wrote to memory of 2928 2756 cmd.exe 38 PID 2756 wrote to memory of 2928 2756 cmd.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\z57novaordempdf.exe"C:\Users\Admin\AppData\Local\Temp\z57novaordempdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PvjpBBSjBpp.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PvjpBBSjBpp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp20BA.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD520e7100ddb2ef14708875141c20a3a5a
SHA15c2ceb63dceeedd97c7401b6c6fa2675a11fd564
SHA2561c56d9a49e8d43c8d9ceefc1ab00afb6912693ef34750bfb07c7d0f90dfc451e
SHA5124ba7302e7f1e914599b6ce5defd0c14ab709d6e8b08b989f8945a73e88e532314a5823386716dfa836715c493058114695e81e71a8b60b1db4434981562c27e2