Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 06:38
Static task
static1
Behavioral task
behavioral1
Sample
payment Copy882pdf.exe
Resource
win7-20240903-en
General
-
Target
payment Copy882pdf.exe
-
Size
682KB
-
MD5
1e16dc0a62bdc864d61277defc19c599
-
SHA1
b72b8a5d8421450cae51b53159fc6c8862f6bc8f
-
SHA256
60ccea072df0c91b1b0f2cc18a88eff5e373c68f4d13c7d93e66fb17d211ec9e
-
SHA512
8f3dc3cd5af8c27a4f8221c6463c9dd95fac544d25dc6103b3d9313986e0f506fc5ad2431d15e2e6846cd00555d1bf278fa320aef8a230c7fe548219ddf3d117
-
SSDEEP
12288:1YmgrSswecl9v2l+FiGQgG6AN1RKLYvvfK6vncTsEdoGs22zImsDHTndj:Iwea2civgGbxK03fK6vcThdopIJjTd
Malware Config
Extracted
formbook
4.1
a02d
coplus.market
oofing-jobs-74429.bond
healchemists.xyz
oofcarpenternearme-jp.xyz
enewebsolutions.online
harepoint.legal
88977.club
omptables.xyz
eat-pumps-31610.bond
endown.graphics
amsexgirls.website
ovevibes.xyz
u-thiensu.online
yblinds.xyz
rumpchiefofstaff.store
erzog.fun
rrm.lat
agiclime.pro
agaviet59.shop
lbdoanhnhan.net
irvasenitpalvelut.online
strange.store
bsidiansurvival.shop
lown.bond
irrorbd.online
idzev.shop
tyleyourvibe.shop
qweemaildwqfewew.live
sychology-degree-92767.bond
orklift-jobs-76114.bond
nytymeoccassions.store
nfluencer-marketing-41832.bond
rh799295w.vip
066661a23.buzz
m235a.net
omestur.online
nalyzator.fun
itchen-remodeling-41686.bond
ontenbully.shop
oratrading.best
tiwebu.info
lueticks.shop
ocubox.xyz
q33.lat
earch-solar-installer-top.today
ceqne.vip
8betpragmatic.store
oftware-download-37623.bond
oofing-jobs-29700.bond
vorachem.xyz
ruck-driver-jobs-58337.bond
om-exchange-nft370213.sbs
jfghnxnvdfgh.icu
inhngoc.webcam
ruck-driver-jobs-86708.bond
oftware-engineering-27699.bond
nfoyl.xyz
estionprojetsccpm.online
reativesos.studio
ammamiaitalia.net
4cw.lat
oofighters.xyz
ukusindo4dpools.net
yhbvc.xyz
8435.pizza
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2732-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2732-27-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/480-30-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2812 powershell.exe 2736 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2236 set thread context of 2732 2236 payment Copy882pdf.exe 37 PID 2732 set thread context of 1208 2732 RegSvcs.exe 21 PID 2732 set thread context of 1208 2732 RegSvcs.exe 21 PID 480 set thread context of 1208 480 wscript.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language payment Copy882pdf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2236 payment Copy882pdf.exe 2236 payment Copy882pdf.exe 2812 powershell.exe 2736 powershell.exe 2732 RegSvcs.exe 2732 RegSvcs.exe 2732 RegSvcs.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe 480 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2732 RegSvcs.exe 2732 RegSvcs.exe 2732 RegSvcs.exe 2732 RegSvcs.exe 480 wscript.exe 480 wscript.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2236 payment Copy882pdf.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2732 RegSvcs.exe Token: SeDebugPrivilege 480 wscript.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2736 2236 payment Copy882pdf.exe 31 PID 2236 wrote to memory of 2736 2236 payment Copy882pdf.exe 31 PID 2236 wrote to memory of 2736 2236 payment Copy882pdf.exe 31 PID 2236 wrote to memory of 2736 2236 payment Copy882pdf.exe 31 PID 2236 wrote to memory of 2812 2236 payment Copy882pdf.exe 33 PID 2236 wrote to memory of 2812 2236 payment Copy882pdf.exe 33 PID 2236 wrote to memory of 2812 2236 payment Copy882pdf.exe 33 PID 2236 wrote to memory of 2812 2236 payment Copy882pdf.exe 33 PID 2236 wrote to memory of 2868 2236 payment Copy882pdf.exe 35 PID 2236 wrote to memory of 2868 2236 payment Copy882pdf.exe 35 PID 2236 wrote to memory of 2868 2236 payment Copy882pdf.exe 35 PID 2236 wrote to memory of 2868 2236 payment Copy882pdf.exe 35 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2236 wrote to memory of 2732 2236 payment Copy882pdf.exe 37 PID 2732 wrote to memory of 480 2732 RegSvcs.exe 38 PID 2732 wrote to memory of 480 2732 RegSvcs.exe 38 PID 2732 wrote to memory of 480 2732 RegSvcs.exe 38 PID 2732 wrote to memory of 480 2732 RegSvcs.exe 38 PID 480 wrote to memory of 2584 480 wscript.exe 39 PID 480 wrote to memory of 2584 480 wscript.exe 39 PID 480 wrote to memory of 2584 480 wscript.exe 39 PID 480 wrote to memory of 2584 480 wscript.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\payment Copy882pdf.exe"C:\Users\Admin\AppData\Local\Temp\payment Copy882pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\payment Copy882pdf.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KtITRcPJlV.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KtITRcPJlV" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD182.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c08d16c8dad9aae62c2f227753aee799
SHA1593c460c989b33c2deb2c30986a0d5798893bce5
SHA256457a9e3a25938b21938f03eb705ee2d1b6d100ddee5fe710a0259f09d0366c26
SHA512dc53b94b55dfe06e557fe1bb2e1738ab70f5a929a5e515137c9fa6e1a23a1bf1a9c5d474630d8a306ee65ede6b9925325c50d1c00d6ab5b25865df3356d883c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9T9ET1L09RTIL08CGUUE.temp
Filesize7KB
MD5192b54b5f804b37a39febed95772a3ce
SHA1a74baee176ee2f74ccd5c8a7c404a12466bddd11
SHA2560d5b1011a44e46e53fe74d99dc835dc3f72cad57ff25fb5a3f66f888a03c667e
SHA5128f1c4b62ef2e18245109775c14ee4022b530c1911a116d2ca6408d6cccd77fceab907538ccb91be681d7b723b4a65eae5dfd0702291bd2bc66af056313dbfc31