Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
REVISED SOA 19-03-25 PDF.exe
Resource
win7-20241023-en
General
-
Target
REVISED SOA 19-03-25 PDF.exe
-
Size
630KB
-
MD5
2f2be19e7df6549682b6db140841ef0c
-
SHA1
46b52ec65561265ed8936cbe1a4fdf417d87d629
-
SHA256
582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709
-
SHA512
9c4e87048ccd46ec60ac80a667384aa15b3dcf04ff5f8242918b1ebb9b9f8cb452c4d1f6d7c0712d8c90f0acc616d50a94cf448e28d8616e03f639e86192affc
-
SSDEEP
12288:+cTjvOn6nzxQkjZGhGZJd60sqQ0Om1lEWnBynQa44F8+19tNW3:Jj2n6n2ktGhGcVxyyMByQj4F8+19tw
Malware Config
Extracted
formbook
4.1
a03d
nfluencer-marketing-13524.bond
cebepu.info
lphatechblog.xyz
haoyun.website
itiz.xyz
orld-visa-center.online
si.art
alata.xyz
mmarketing.xyz
elnqdjc.shop
ensentoto.cloud
voyagu.info
onvert.today
1fuli9902.shop
otelhafnia.info
rumpchiefofstaff.store
urvivalflashlights.shop
0090.pizza
ings-hu-13.today
oliticalpatriot.net
5970.pizza
arimatch-in.legal
eepvid.xyz
bfootball.net
otorcycle-loans-19502.bond
nline-advertising-34790.bond
behm.info
aportsystems.store
agiararoma.net
agfov4u.xyz
9769.mobi
ome-renovation-86342.bond
kkkk.shop
duxrib.xyz
xurobo.info
leurdivin.online
ive-neurozoom.store
ndogaming.online
dj1.lat
yselection.xyz
52628.xyz
lsaadmart.store
oftware-download-92806.bond
avid-hildebrand.info
orashrine.store
erpangina-treatment-views.sbs
ategorie-polecane-831.buzz
oonlightshadow.shop
istromarmitaria.online
gmgslzdc.sbs
asglobalaz.shop
locarry.store
eleefmestreech.online
inggraphic.pro
atidiri.fun
olourclubbet.shop
eatbox.store
romatografia.online
encortex.beauty
8oosnny.xyz
72266.vip
aja168e.live
fath.shop
argloscaremedia.info
enelog.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2508-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2508-27-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2728-29-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2688 powershell.exe 2772 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2864 set thread context of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 2508 set thread context of 1196 2508 MSBuild.exe 21 PID 2508 set thread context of 1196 2508 MSBuild.exe 21 PID 2728 set thread context of 1196 2728 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REVISED SOA 19-03-25 PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2864 REVISED SOA 19-03-25 PDF.exe 2864 REVISED SOA 19-03-25 PDF.exe 2688 powershell.exe 2508 MSBuild.exe 2772 powershell.exe 2508 MSBuild.exe 2508 MSBuild.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe 2728 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2508 MSBuild.exe 2508 MSBuild.exe 2508 MSBuild.exe 2508 MSBuild.exe 2728 cmstp.exe 2728 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2864 REVISED SOA 19-03-25 PDF.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2508 MSBuild.exe Token: SeDebugPrivilege 2728 cmstp.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2688 2864 REVISED SOA 19-03-25 PDF.exe 30 PID 2864 wrote to memory of 2688 2864 REVISED SOA 19-03-25 PDF.exe 30 PID 2864 wrote to memory of 2688 2864 REVISED SOA 19-03-25 PDF.exe 30 PID 2864 wrote to memory of 2688 2864 REVISED SOA 19-03-25 PDF.exe 30 PID 2864 wrote to memory of 2772 2864 REVISED SOA 19-03-25 PDF.exe 32 PID 2864 wrote to memory of 2772 2864 REVISED SOA 19-03-25 PDF.exe 32 PID 2864 wrote to memory of 2772 2864 REVISED SOA 19-03-25 PDF.exe 32 PID 2864 wrote to memory of 2772 2864 REVISED SOA 19-03-25 PDF.exe 32 PID 2864 wrote to memory of 2832 2864 REVISED SOA 19-03-25 PDF.exe 34 PID 2864 wrote to memory of 2832 2864 REVISED SOA 19-03-25 PDF.exe 34 PID 2864 wrote to memory of 2832 2864 REVISED SOA 19-03-25 PDF.exe 34 PID 2864 wrote to memory of 2832 2864 REVISED SOA 19-03-25 PDF.exe 34 PID 2864 wrote to memory of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 2864 wrote to memory of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 2864 wrote to memory of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 2864 wrote to memory of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 2864 wrote to memory of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 2864 wrote to memory of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 2864 wrote to memory of 2508 2864 REVISED SOA 19-03-25 PDF.exe 36 PID 1196 wrote to memory of 2728 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2728 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2728 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2728 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2728 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2728 1196 Explorer.EXE 37 PID 1196 wrote to memory of 2728 1196 Explorer.EXE 37 PID 2728 wrote to memory of 3068 2728 cmstp.exe 38 PID 2728 wrote to memory of 3068 2728 cmstp.exe 38 PID 2728 wrote to memory of 3068 2728 cmstp.exe 38 PID 2728 wrote to memory of 3068 2728 cmstp.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\REVISED SOA 19-03-25 PDF.exe"C:\Users\Admin\AppData\Local\Temp\REVISED SOA 19-03-25 PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\REVISED SOA 19-03-25 PDF.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TsSurBeHosk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TsSurBeHosk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp784B.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51170978878b860152bdd384101edf527
SHA13732003e453a40faa4b791a47a6a39966d35a6f3
SHA2563bfb73597a283d8e946ecab50a88bccb8d94d2693b3e57cd20505ec23021a927
SHA51264ce84175797241c1d740dcf412060306f77a0540c7beddae059c4f8a53d5f00a27ba6b367b0b9232bdfbded84b1958b1694c1c5b13e8a01595abb238af4ef10
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fb90eeb7888155845d56e838e87dfd58
SHA1afb9b1bfe8288cb05a0a84645a7586ef769f3f40
SHA256d9e074d85aca5fe355b9450b8552f4cdb5c37ddeb322ebf698c94f85821b0e14
SHA51244e56543cde3310f5017f31f28289dd9a1fe879210b2bbf8cc39a903ba725fc1f9b40ac1d706ebd20aa3b027efd00a75c5dff11109eec258d1f1890ef271d6c2