Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order #PO11774.exe
Resource
win7-20240903-en
General
-
Target
Purchase Order #PO11774.exe
-
Size
640KB
-
MD5
e0d5a1d3be5203913a112da74dde9326
-
SHA1
9a0c4da5adc288a9921d0ef9103ed27da1e0464d
-
SHA256
a15006eb6ff449cff64e2df7ed41e85051eb25c0e179b14c9e04f7464ff69bb2
-
SHA512
44ee9fa209cfc9478bf79c97ea0cd1eaaa6e2301c7ee0228850c1136db3da247fa1902559241e0e726ef4e47d05387aee99c4319e1673b8ada500a4c0b8f1593
-
SSDEEP
12288:0eQiKaxzulQ0BXdLVymkQwF1712Me7g69MQyCjrED:1Qi5uxBXtVlkQw1jv699JoD
Malware Config
Extracted
formbook
4.1
a03d
nfluencer-marketing-13524.bond
cebepu.info
lphatechblog.xyz
haoyun.website
itiz.xyz
orld-visa-center.online
si.art
alata.xyz
mmarketing.xyz
elnqdjc.shop
ensentoto.cloud
voyagu.info
onvert.today
1fuli9902.shop
otelhafnia.info
rumpchiefofstaff.store
urvivalflashlights.shop
0090.pizza
ings-hu-13.today
oliticalpatriot.net
5970.pizza
arimatch-in.legal
eepvid.xyz
bfootball.net
otorcycle-loans-19502.bond
nline-advertising-34790.bond
behm.info
aportsystems.store
agiararoma.net
agfov4u.xyz
9769.mobi
ome-renovation-86342.bond
kkkk.shop
duxrib.xyz
xurobo.info
leurdivin.online
ive-neurozoom.store
ndogaming.online
dj1.lat
yselection.xyz
52628.xyz
lsaadmart.store
oftware-download-92806.bond
avid-hildebrand.info
orashrine.store
erpangina-treatment-views.sbs
ategorie-polecane-831.buzz
oonlightshadow.shop
istromarmitaria.online
gmgslzdc.sbs
asglobalaz.shop
locarry.store
eleefmestreech.online
inggraphic.pro
atidiri.fun
olourclubbet.shop
eatbox.store
romatografia.online
encortex.beauty
8oosnny.xyz
72266.vip
aja168e.live
fath.shop
argloscaremedia.info
enelog.xyz
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1648-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/980-28-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2876 powershell.exe 2872 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2396 set thread context of 1648 2396 Purchase Order #PO11774.exe 37 PID 1648 set thread context of 1200 1648 MSBuild.exe 21 PID 980 set thread context of 1200 980 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order #PO11774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2396 Purchase Order #PO11774.exe 2396 Purchase Order #PO11774.exe 1648 MSBuild.exe 1648 MSBuild.exe 2876 powershell.exe 2872 powershell.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe 980 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1648 MSBuild.exe 1648 MSBuild.exe 1648 MSBuild.exe 980 cmstp.exe 980 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2396 Purchase Order #PO11774.exe Token: SeDebugPrivilege 1648 MSBuild.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 980 cmstp.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2876 2396 Purchase Order #PO11774.exe 31 PID 2396 wrote to memory of 2876 2396 Purchase Order #PO11774.exe 31 PID 2396 wrote to memory of 2876 2396 Purchase Order #PO11774.exe 31 PID 2396 wrote to memory of 2876 2396 Purchase Order #PO11774.exe 31 PID 2396 wrote to memory of 2872 2396 Purchase Order #PO11774.exe 33 PID 2396 wrote to memory of 2872 2396 Purchase Order #PO11774.exe 33 PID 2396 wrote to memory of 2872 2396 Purchase Order #PO11774.exe 33 PID 2396 wrote to memory of 2872 2396 Purchase Order #PO11774.exe 33 PID 2396 wrote to memory of 2808 2396 Purchase Order #PO11774.exe 34 PID 2396 wrote to memory of 2808 2396 Purchase Order #PO11774.exe 34 PID 2396 wrote to memory of 2808 2396 Purchase Order #PO11774.exe 34 PID 2396 wrote to memory of 2808 2396 Purchase Order #PO11774.exe 34 PID 2396 wrote to memory of 1648 2396 Purchase Order #PO11774.exe 37 PID 2396 wrote to memory of 1648 2396 Purchase Order #PO11774.exe 37 PID 2396 wrote to memory of 1648 2396 Purchase Order #PO11774.exe 37 PID 2396 wrote to memory of 1648 2396 Purchase Order #PO11774.exe 37 PID 2396 wrote to memory of 1648 2396 Purchase Order #PO11774.exe 37 PID 2396 wrote to memory of 1648 2396 Purchase Order #PO11774.exe 37 PID 2396 wrote to memory of 1648 2396 Purchase Order #PO11774.exe 37 PID 1200 wrote to memory of 980 1200 Explorer.EXE 38 PID 1200 wrote to memory of 980 1200 Explorer.EXE 38 PID 1200 wrote to memory of 980 1200 Explorer.EXE 38 PID 1200 wrote to memory of 980 1200 Explorer.EXE 38 PID 1200 wrote to memory of 980 1200 Explorer.EXE 38 PID 1200 wrote to memory of 980 1200 Explorer.EXE 38 PID 1200 wrote to memory of 980 1200 Explorer.EXE 38 PID 980 wrote to memory of 2664 980 cmstp.exe 39 PID 980 wrote to memory of 2664 980 cmstp.exe 39 PID 980 wrote to memory of 2664 980 cmstp.exe 39 PID 980 wrote to memory of 2664 980 cmstp.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO11774.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO11774.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO11774.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QsKldZxyVDfk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QsKldZxyVDfk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp20CA.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53cc0e3725635f3b81f007bf489c5b220
SHA19f3adfa172fcb2fb49b800f95565a4fdd2273af4
SHA2567e1256265584ff51a6c9707d111d335f4f27beb1c961493b996b293085ab787c
SHA5124f320c3259a5ac138b21667b7f307ce91b7df9e2bedf01411b504994142ae8b00fff9addf69a3588799c37f1255babe084c8be8d190c20c21d9a87b4554ac7a3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LYH7U1MZGC27F0Y3W8JB.temp
Filesize7KB
MD5502e4e7c7e4cb11e0af579e63d29f78e
SHA17bac8e11d577c20b2e825f65abbdc8c8a425d22f
SHA256ce9a5eae9ca52b47c170b05ac89a550a1478739796dd3c3e47a1414b21318b33
SHA5124d7e0bef50187ba2399a0957a304f0bc9fab2c18419e3740a93f130414843c45c37b963cc63122bd21206d92d42c5fa82ae06c05673e3c93c51b08f08f7761fc