Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2025, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
nouacomandapdf.exe
Resource
win10v2004-20250410-en
General
-
Target
nouacomandapdf.exe
-
Size
654KB
-
MD5
ceca2dff2ddf27ee53ad866b23535b48
-
SHA1
d9012c547137e1c643b436a25feab998a3a49c52
-
SHA256
f3398e6a171a2dc31c171813aba4aba9e9d81921a65151f8c16d63df8e638c88
-
SHA512
d37171eb6ac5ce0b4359911fee958daeecf5520a52dfc7fbf026c63eab12f7c68f2bc75f7efb0b2c0eac41877399bebcf81db7296b969a2777330cf6dba74ec2
-
SSDEEP
12288:cbN0Q5CmNR4Un7Z+51quHB2qCJtu9L0hX:W0aeU7SHBOJc9Ih
Malware Config
Extracted
formbook
4.1
kmge
i54ly657ur.autos
stove-10000.bond
furkanenes.live
foziaclothing.shop
peron.app
landscaping-services-88568.bond
home-remodeling-96005.bond
offersnow-store.shop
apsida.tech
ux-design-courses-90368.bond
nb-event-b2b.online
2tdb3dk65m.skin
juniper.fit
eurosirel.info
web-cfe.one
a48268104.top
darkoxygen.info
beautysideup.shop
solar-battery-34557.bond
dib57.top
apihoki.live
cinholiao3.click
binxbress-bd-w8-em.shop
car-loans-78152.bond
cypher.casino
go88l.club
youyou0612.cfd
car-deals-93792.bond
ft0722a9usj38.shop
zxxzaanm.top
getc.pro
son37.club
bakingcourse01.today
refpalhsdx.top
sweethome4.buzz
yaqpqljcwmhesaj.buzz
gsolartech.com
nw0qbr.top
sakanatei.net
home-care-access-new-promo.bond
llama3-2video.net
douromaintenance.info
joycasino-hem.top
cg-qu.xyz
bogotienda.online
010jcgk.com
solar-systems-panels-50320.bond
cosmetics-30710.bond
pgfnrecuperacao.store
imples.live
bnckdaae.top
silviarusina.shop
krainedating.info
maskverifyemail.online
ttrading.pro
trendy-style.store
miranda-j.online
030003741.xyz
hoteldanibaan.info
zunica.shop
ftth.monster
c87xy374jt.bond
yhy05.cfd
blueoceanfilm.institute
lapostehotel.one
Signatures
-
Formbook family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\skype\\skype.exe," reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\skype\\skype.exe," reg.exe -
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/804-26-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/804-28-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1440-30-0x00000000010E0000-0x000000000110F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation nouacomandapdf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4480 skype.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4480 set thread context of 804 4480 skype.exe 112 PID 804 set thread context of 3444 804 AddInProcess32.exe 56 PID 804 set thread context of 3444 804 AddInProcess32.exe 56 PID 1440 set thread context of 3444 1440 ipconfig.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nouacomandapdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3408 PING.EXE 4828 PING.EXE 5724 cmd.exe 6116 PING.EXE 1048 cmd.exe 1872 cmd.exe 3636 PING.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1440 ipconfig.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 4828 PING.EXE 6116 PING.EXE 3636 PING.EXE 3408 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3952 nouacomandapdf.exe 3952 nouacomandapdf.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4980 skype.exe 4480 skype.exe 4480 skype.exe 4480 skype.exe 804 AddInProcess32.exe 804 AddInProcess32.exe 804 AddInProcess32.exe 804 AddInProcess32.exe 804 AddInProcess32.exe 804 AddInProcess32.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe 1440 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3444 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 804 AddInProcess32.exe 804 AddInProcess32.exe 804 AddInProcess32.exe 804 AddInProcess32.exe 1440 ipconfig.exe 1440 ipconfig.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3952 nouacomandapdf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3952 nouacomandapdf.exe Token: SeDebugPrivilege 4980 skype.exe Token: SeDebugPrivilege 4480 skype.exe Token: SeDebugPrivilege 804 AddInProcess32.exe Token: SeDebugPrivilege 1440 ipconfig.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Explorer.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3952 wrote to memory of 5724 3952 nouacomandapdf.exe 90 PID 3952 wrote to memory of 5724 3952 nouacomandapdf.exe 90 PID 3952 wrote to memory of 5724 3952 nouacomandapdf.exe 90 PID 5724 wrote to memory of 4828 5724 cmd.exe 92 PID 5724 wrote to memory of 4828 5724 cmd.exe 92 PID 5724 wrote to memory of 4828 5724 cmd.exe 92 PID 3952 wrote to memory of 4980 3952 nouacomandapdf.exe 93 PID 3952 wrote to memory of 4980 3952 nouacomandapdf.exe 93 PID 3952 wrote to memory of 4980 3952 nouacomandapdf.exe 93 PID 4980 wrote to memory of 1048 4980 skype.exe 94 PID 4980 wrote to memory of 1048 4980 skype.exe 94 PID 4980 wrote to memory of 1048 4980 skype.exe 94 PID 1048 wrote to memory of 6116 1048 cmd.exe 96 PID 1048 wrote to memory of 6116 1048 cmd.exe 96 PID 1048 wrote to memory of 6116 1048 cmd.exe 96 PID 4980 wrote to memory of 1872 4980 skype.exe 100 PID 4980 wrote to memory of 1872 4980 skype.exe 100 PID 4980 wrote to memory of 1872 4980 skype.exe 100 PID 1872 wrote to memory of 3636 1872 cmd.exe 102 PID 1872 wrote to memory of 3636 1872 cmd.exe 102 PID 1872 wrote to memory of 3636 1872 cmd.exe 102 PID 5724 wrote to memory of 904 5724 cmd.exe 106 PID 5724 wrote to memory of 904 5724 cmd.exe 106 PID 5724 wrote to memory of 904 5724 cmd.exe 106 PID 1048 wrote to memory of 336 1048 cmd.exe 107 PID 1048 wrote to memory of 336 1048 cmd.exe 107 PID 1048 wrote to memory of 336 1048 cmd.exe 107 PID 1872 wrote to memory of 3408 1872 cmd.exe 110 PID 1872 wrote to memory of 3408 1872 cmd.exe 110 PID 1872 wrote to memory of 3408 1872 cmd.exe 110 PID 1872 wrote to memory of 4480 1872 cmd.exe 111 PID 1872 wrote to memory of 4480 1872 cmd.exe 111 PID 1872 wrote to memory of 4480 1872 cmd.exe 111 PID 4480 wrote to memory of 804 4480 skype.exe 112 PID 4480 wrote to memory of 804 4480 skype.exe 112 PID 4480 wrote to memory of 804 4480 skype.exe 112 PID 4480 wrote to memory of 804 4480 skype.exe 112 PID 4480 wrote to memory of 804 4480 skype.exe 112 PID 4480 wrote to memory of 804 4480 skype.exe 112 PID 3444 wrote to memory of 1440 3444 Explorer.EXE 121 PID 3444 wrote to memory of 1440 3444 Explorer.EXE 121 PID 3444 wrote to memory of 1440 3444 Explorer.EXE 121 PID 1440 wrote to memory of 2200 1440 ipconfig.exe 123 PID 1440 wrote to memory of 2200 1440 ipconfig.exe 123 PID 1440 wrote to memory of 2200 1440 ipconfig.exe 123
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\nouacomandapdf.exe"C:\Users\Admin\AppData\Local\Temp\nouacomandapdf.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5724 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 94⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4828
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\skype.exe"C:\Users\Admin\AppData\Local\Temp\skype.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 85⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6116
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"5⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 11 > nul && copy "C:\Users\Admin\AppData\Local\Temp\skype.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe" && ping 127.0.0.1 -n 11 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 115⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3636
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 115⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3408
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
-
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f7e75d0af51afad1f3d4632dd430539b
SHA1211476029da6303687348fe924d16ec4375899c5
SHA256ee338c5e7245b30cc36cbbefd38037dc662a67f5725f98fa3bee633a42a74116
SHA512d813d7c1ea2ecc284fb79b6b4cdc8ffcd5fcaad65254e3fd117d64b12864afcf139ce420e77c140f64794360bb9e95caae876affa7c76c8526ca51a99e8a78aa
-
Filesize
654KB
MD5ceca2dff2ddf27ee53ad866b23535b48
SHA1d9012c547137e1c643b436a25feab998a3a49c52
SHA256f3398e6a171a2dc31c171813aba4aba9e9d81921a65151f8c16d63df8e638c88
SHA512d37171eb6ac5ce0b4359911fee958daeecf5520a52dfc7fbf026c63eab12f7c68f2bc75f7efb0b2c0eac41877399bebcf81db7296b969a2777330cf6dba74ec2