Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
yeni sifariş pdf.exe
Resource
win7-20240903-en
General
-
Target
yeni sifariş pdf.exe
-
Size
610KB
-
MD5
614d0911a4db90a2ad750b5ec42640fb
-
SHA1
d33e0045ad249e4c85452ceac63c3d2bdb1d4df3
-
SHA256
5ade11c9dbb4f221d73784653c243c629ff804c6a4af5d5c8aad88d64e48a864
-
SHA512
31dcfd2d93faada4fa359f2c196a3fb7b598fb6c5d33b76595cb33146498978c8a79d73654a126c84315f1b0ba2782238d2ce2d87e0fccdb79e1770035aaadcd
-
SSDEEP
12288:qYVDa977OqHNNJMvpLP6V/DayvziAQVUg7/mo:qiaRN8LKDLbiAti
Malware Config
Extracted
formbook
4.1
kk18
ampbelltx.info
omovremont.store
haiyaoder.top
18y6s32s.top
ykbai.website
riwh.bid
iuzhou15.top
ibdobreva.art
onfitdentwithkat.net
ransitplus.biz
oymcfaddin.art
zzicasino-21.buzz
essonsandblessings.shop
antappecah001.mom
amilianm.store
ertbz.xyz
ajbke.shop
plate.online
roblemclassified.online
ewssphere.one
robuzj.property
86r5.info
itchen-design-57211.bond
dc-gmbh.net
ogel.loan
wqo.xyz
ikskp.top
nxezvnjtk.xyz
oodwar.shop
name.vip
ipcity.net
6851044.vip
ogel.kim
24kzty991r.shop
249.top
unas.shop
ental-insurance-us-631.xyz
rttherapies.art
roperty4tshwane.online
avidhost.site
dinara.best
temwork.info
arrisseedse.shop
luxfyxerflow.info
bvljoe.solutions
ennyandpearljewellery.net
hrgreret.online
67frmu442r.shop
lobelifecom.net
inetask.net
lzgwcxlgtrf.sbs
rick-mason-jobs-27365.bond
inlinwangziyi.fun
alo4d.net
ubyqtbzs7i6n.buzz
trahlkraft.pro
ophackerkampala256.store
ewdq.top
lowfy1.store
igna.store
zfah.agency
efundee.help
eddings-56794.bond
gtttttt224.top
ideosha.vip
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2468-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2468-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2468-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2764-29-0x00000000000C0000-0x00000000000EE000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1924 set thread context of 2468 1924 yeni sifariş pdf.exe 31 PID 2468 set thread context of 1252 2468 AddInProcess32.exe 21 PID 2468 set thread context of 1252 2468 AddInProcess32.exe 21 PID 2764 set thread context of 1252 2764 ipconfig.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yeni sifariş pdf.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2764 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1924 yeni sifariş pdf.exe 1924 yeni sifariş pdf.exe 1924 yeni sifariş pdf.exe 2468 AddInProcess32.exe 2468 AddInProcess32.exe 2468 AddInProcess32.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1252 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2468 AddInProcess32.exe 2468 AddInProcess32.exe 2468 AddInProcess32.exe 2468 AddInProcess32.exe 2764 ipconfig.exe 2764 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1924 yeni sifariş pdf.exe Token: SeDebugPrivilege 2468 AddInProcess32.exe Token: SeDebugPrivilege 2764 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2468 1924 yeni sifariş pdf.exe 31 PID 1924 wrote to memory of 2468 1924 yeni sifariş pdf.exe 31 PID 1924 wrote to memory of 2468 1924 yeni sifariş pdf.exe 31 PID 1924 wrote to memory of 2468 1924 yeni sifariş pdf.exe 31 PID 1924 wrote to memory of 2468 1924 yeni sifariş pdf.exe 31 PID 1924 wrote to memory of 2468 1924 yeni sifariş pdf.exe 31 PID 1924 wrote to memory of 2468 1924 yeni sifariş pdf.exe 31 PID 1252 wrote to memory of 2764 1252 Explorer.EXE 32 PID 1252 wrote to memory of 2764 1252 Explorer.EXE 32 PID 1252 wrote to memory of 2764 1252 Explorer.EXE 32 PID 1252 wrote to memory of 2764 1252 Explorer.EXE 32 PID 2764 wrote to memory of 2744 2764 ipconfig.exe 33 PID 2764 wrote to memory of 2744 2764 ipconfig.exe 33 PID 2764 wrote to memory of 2744 2764 ipconfig.exe 33 PID 2764 wrote to memory of 2744 2764 ipconfig.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\yeni sifariş pdf.exe"C:\Users\Admin\AppData\Local\Temp\yeni sifariş pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-