Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 13:00
Static task
static1
Behavioral task
behavioral1
Sample
payment SWIFT pdf.exe
Resource
win7-20240903-en
General
-
Target
payment SWIFT pdf.exe
-
Size
735KB
-
MD5
ed9369e24644b25d49b00072be1543f5
-
SHA1
0c7eb11a4365a8d2c488b512f69bdb682d95cc9a
-
SHA256
a726c5a24472b6e81e1dce922e3d462a1abda9da5bdb28c0f3893850560b1fbd
-
SHA512
c9702ade8907c87b14bdb1f5d84cd0952a3a6f1fcccf1966773f56d5b0c28044705eb9fbcc0cb028a850c63ff0c19e5f151696b92960bce012b1e5447edd22a8
-
SSDEEP
12288:Whn8nFllff8PcCPda11zL+GC9euIZsTilbNHwJm8LoNR8Vr8B6slRIp7:Wh8hsVPkXaGmJIOkYXLoNR2lsRG7
Malware Config
Extracted
formbook
4.1
o10c
regnancy-67873.bond
oppyworld.fun
oomoo.store
illyjolly.online
-avi.art
unisitri.net
unaid-jamshed.shop
ookcovers.xyz
estrated.xyz
rpa.club
4rcraft.online
litz.baby
lysiannails.art
commerce-69321.bond
rokidu.info
havuonvanthanh.store
hiteelephant.online
ghkp.shop
uabf.info
ynthesizerwf.store
kipthegaames.online
92.info
ahjongwins3.cyou
laygroundsequipment.xyz
dhd-treatment-42199.bond
yallergies.online
wefright.net
ancasterequinemassage.net
onja.shop
lugsq.info
rilby.store
nitogel.skin
yskillandyou.xyz
ackcleveland.biz
eziser.fun
uto-loans-in-africa-2024.today
nfluencer-marketing-38653.bond
06ks7.club
lossar.online
hinoplasty-solutions.sbs
y01.vip
r210.info
nfoviral99.xyz
wnyourhealth.xyz
olarmedia.xyz
obotquote.net
aklandpt.net
aifunclub.fit
uivlio.xyz
aromzeciri.shop
panda.xyz
cassg.net
rotableblender.online
ealthyzone.live
bewuxi.info
nline-advertising-37613.bond
mazonworld.store
aixabank.video
rginine555.store
igsawgame.xyz
rbantravelstories.online
engdianertian.vip
d97.lat
enamind.net
izalmart.shop
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2848-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2588-23-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2924 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2504 set thread context of 2848 2504 payment SWIFT pdf.exe 36 PID 2848 set thread context of 1176 2848 RegSvcs.exe 21 PID 2588 set thread context of 1176 2588 cmd.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language payment SWIFT pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2504 payment SWIFT pdf.exe 2504 payment SWIFT pdf.exe 2504 payment SWIFT pdf.exe 2504 payment SWIFT pdf.exe 2848 RegSvcs.exe 2848 RegSvcs.exe 2924 powershell.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe 2588 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2848 RegSvcs.exe 2848 RegSvcs.exe 2848 RegSvcs.exe 2588 cmd.exe 2588 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2504 payment SWIFT pdf.exe Token: SeDebugPrivilege 2848 RegSvcs.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2588 cmd.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2924 2504 payment SWIFT pdf.exe 31 PID 2504 wrote to memory of 2924 2504 payment SWIFT pdf.exe 31 PID 2504 wrote to memory of 2924 2504 payment SWIFT pdf.exe 31 PID 2504 wrote to memory of 2924 2504 payment SWIFT pdf.exe 31 PID 2504 wrote to memory of 956 2504 payment SWIFT pdf.exe 33 PID 2504 wrote to memory of 956 2504 payment SWIFT pdf.exe 33 PID 2504 wrote to memory of 956 2504 payment SWIFT pdf.exe 33 PID 2504 wrote to memory of 956 2504 payment SWIFT pdf.exe 33 PID 2504 wrote to memory of 2812 2504 payment SWIFT pdf.exe 35 PID 2504 wrote to memory of 2812 2504 payment SWIFT pdf.exe 35 PID 2504 wrote to memory of 2812 2504 payment SWIFT pdf.exe 35 PID 2504 wrote to memory of 2812 2504 payment SWIFT pdf.exe 35 PID 2504 wrote to memory of 2812 2504 payment SWIFT pdf.exe 35 PID 2504 wrote to memory of 2812 2504 payment SWIFT pdf.exe 35 PID 2504 wrote to memory of 2812 2504 payment SWIFT pdf.exe 35 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 2504 wrote to memory of 2848 2504 payment SWIFT pdf.exe 36 PID 1176 wrote to memory of 2588 1176 Explorer.EXE 37 PID 1176 wrote to memory of 2588 1176 Explorer.EXE 37 PID 1176 wrote to memory of 2588 1176 Explorer.EXE 37 PID 1176 wrote to memory of 2588 1176 Explorer.EXE 37 PID 2588 wrote to memory of 2752 2588 cmd.exe 38 PID 2588 wrote to memory of 2752 2588 cmd.exe 38 PID 2588 wrote to memory of 2752 2588 cmd.exe 38 PID 2588 wrote to memory of 2752 2588 cmd.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\payment SWIFT pdf.exe"C:\Users\Admin\AppData\Local\Temp\payment SWIFT pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BnqEWcbWmE.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BnqEWcbWmE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF103.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f9fb841a0535fa2336e983d09c340d4f
SHA123654a2a0314b4fff86f89a7b34a2e8c557dcd19
SHA25608346b770b572399f7064f315bbf6812ca6a10c94128f4a105c7a7527459c800
SHA512dfc5d48cb2d8189035c29018649684ff943a3edb3f75e4dfc39c72533280065d8a88238e94d192b27e059d0f885decff603555333a826701453516cee845cad8