Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order #PO11774.exe
Resource
win7-20250207-en
General
-
Target
Purchase Order #PO11774.exe
-
Size
640KB
-
MD5
e0d5a1d3be5203913a112da74dde9326
-
SHA1
9a0c4da5adc288a9921d0ef9103ed27da1e0464d
-
SHA256
a15006eb6ff449cff64e2df7ed41e85051eb25c0e179b14c9e04f7464ff69bb2
-
SHA512
44ee9fa209cfc9478bf79c97ea0cd1eaaa6e2301c7ee0228850c1136db3da247fa1902559241e0e726ef4e47d05387aee99c4319e1673b8ada500a4c0b8f1593
-
SSDEEP
12288:0eQiKaxzulQ0BXdLVymkQwF1712Me7g69MQyCjrED:1Qi5uxBXtVlkQw1jv699JoD
Malware Config
Extracted
formbook
4.1
a03d
nfluencer-marketing-13524.bond
cebepu.info
lphatechblog.xyz
haoyun.website
itiz.xyz
orld-visa-center.online
si.art
alata.xyz
mmarketing.xyz
elnqdjc.shop
ensentoto.cloud
voyagu.info
onvert.today
1fuli9902.shop
otelhafnia.info
rumpchiefofstaff.store
urvivalflashlights.shop
0090.pizza
ings-hu-13.today
oliticalpatriot.net
5970.pizza
arimatch-in.legal
eepvid.xyz
bfootball.net
otorcycle-loans-19502.bond
nline-advertising-34790.bond
behm.info
aportsystems.store
agiararoma.net
agfov4u.xyz
9769.mobi
ome-renovation-86342.bond
kkkk.shop
duxrib.xyz
xurobo.info
leurdivin.online
ive-neurozoom.store
ndogaming.online
dj1.lat
yselection.xyz
52628.xyz
lsaadmart.store
oftware-download-92806.bond
avid-hildebrand.info
orashrine.store
erpangina-treatment-views.sbs
ategorie-polecane-831.buzz
oonlightshadow.shop
istromarmitaria.online
gmgslzdc.sbs
asglobalaz.shop
locarry.store
eleefmestreech.online
inggraphic.pro
atidiri.fun
olourclubbet.shop
eatbox.store
romatografia.online
encortex.beauty
8oosnny.xyz
72266.vip
aja168e.live
fath.shop
argloscaremedia.info
enelog.xyz
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1704-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3020-28-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2552 powershell.exe 2112 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1048 set thread context of 1704 1048 Purchase Order #PO11774.exe 37 PID 1704 set thread context of 1196 1704 MSBuild.exe 21 PID 3020 set thread context of 1196 3020 help.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order #PO11774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1048 Purchase Order #PO11774.exe 2112 powershell.exe 2552 powershell.exe 1048 Purchase Order #PO11774.exe 1048 Purchase Order #PO11774.exe 1048 Purchase Order #PO11774.exe 1704 MSBuild.exe 1704 MSBuild.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe 3020 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1704 MSBuild.exe 1704 MSBuild.exe 1704 MSBuild.exe 3020 help.exe 3020 help.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1048 Purchase Order #PO11774.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 1704 MSBuild.exe Token: SeDebugPrivilege 3020 help.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2112 1048 Purchase Order #PO11774.exe 30 PID 1048 wrote to memory of 2112 1048 Purchase Order #PO11774.exe 30 PID 1048 wrote to memory of 2112 1048 Purchase Order #PO11774.exe 30 PID 1048 wrote to memory of 2112 1048 Purchase Order #PO11774.exe 30 PID 1048 wrote to memory of 2552 1048 Purchase Order #PO11774.exe 32 PID 1048 wrote to memory of 2552 1048 Purchase Order #PO11774.exe 32 PID 1048 wrote to memory of 2552 1048 Purchase Order #PO11774.exe 32 PID 1048 wrote to memory of 2552 1048 Purchase Order #PO11774.exe 32 PID 1048 wrote to memory of 2468 1048 Purchase Order #PO11774.exe 34 PID 1048 wrote to memory of 2468 1048 Purchase Order #PO11774.exe 34 PID 1048 wrote to memory of 2468 1048 Purchase Order #PO11774.exe 34 PID 1048 wrote to memory of 2468 1048 Purchase Order #PO11774.exe 34 PID 1048 wrote to memory of 2016 1048 Purchase Order #PO11774.exe 36 PID 1048 wrote to memory of 2016 1048 Purchase Order #PO11774.exe 36 PID 1048 wrote to memory of 2016 1048 Purchase Order #PO11774.exe 36 PID 1048 wrote to memory of 2016 1048 Purchase Order #PO11774.exe 36 PID 1048 wrote to memory of 1704 1048 Purchase Order #PO11774.exe 37 PID 1048 wrote to memory of 1704 1048 Purchase Order #PO11774.exe 37 PID 1048 wrote to memory of 1704 1048 Purchase Order #PO11774.exe 37 PID 1048 wrote to memory of 1704 1048 Purchase Order #PO11774.exe 37 PID 1048 wrote to memory of 1704 1048 Purchase Order #PO11774.exe 37 PID 1048 wrote to memory of 1704 1048 Purchase Order #PO11774.exe 37 PID 1048 wrote to memory of 1704 1048 Purchase Order #PO11774.exe 37 PID 1196 wrote to memory of 3020 1196 Explorer.EXE 38 PID 1196 wrote to memory of 3020 1196 Explorer.EXE 38 PID 1196 wrote to memory of 3020 1196 Explorer.EXE 38 PID 1196 wrote to memory of 3020 1196 Explorer.EXE 38 PID 3020 wrote to memory of 2812 3020 help.exe 39 PID 3020 wrote to memory of 2812 3020 help.exe 39 PID 3020 wrote to memory of 2812 3020 help.exe 39 PID 3020 wrote to memory of 2812 3020 help.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO11774.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO11774.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO11774.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QsKldZxyVDfk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QsKldZxyVDfk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC17B.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53bb0fad678ca4c026044aac2c3298d0f
SHA19ffa8c9026ba7eb8aad51908ceef35337ded0697
SHA25638295ef0b93f82e19fbf2e03500715259ed439ac62ad4606e16b8f61a5d56acc
SHA5128f6a3d02437970a805f4122af9ea45b42daa2e7dc75addb8d3c424cc9dae0a388117df71dc3e858844afdd9b980f14382c059f44d59ce55c08daec2253a40821
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD53d5269d43361384e12dc75e803b00b4d
SHA1b9698cf8418ca91d1357ab7c8f8710be3d7f7b9f
SHA2560de3dbaef449dbd35fc85d813e1cf86fcbb2159a4a2655f012b6149503793bcd
SHA5126a76dbaeef9974512b908a502c2ac1f76870e8c2792bafa68c55011852db24ae314ba38fa67a3a76bef9421a7a05a77b826c61323843dab9de771b7e7709f9e9