Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
nouacomandapdf.exe
Resource
win10v2004-20250410-en
General
-
Target
nouacomandapdf.exe
-
Size
654KB
-
MD5
ceca2dff2ddf27ee53ad866b23535b48
-
SHA1
d9012c547137e1c643b436a25feab998a3a49c52
-
SHA256
f3398e6a171a2dc31c171813aba4aba9e9d81921a65151f8c16d63df8e638c88
-
SHA512
d37171eb6ac5ce0b4359911fee958daeecf5520a52dfc7fbf026c63eab12f7c68f2bc75f7efb0b2c0eac41877399bebcf81db7296b969a2777330cf6dba74ec2
-
SSDEEP
12288:cbN0Q5CmNR4Un7Z+51quHB2qCJtu9L0hX:W0aeU7SHBOJc9Ih
Malware Config
Extracted
formbook
4.1
kmge
i54ly657ur.autos
stove-10000.bond
furkanenes.live
foziaclothing.shop
peron.app
landscaping-services-88568.bond
home-remodeling-96005.bond
offersnow-store.shop
apsida.tech
ux-design-courses-90368.bond
nb-event-b2b.online
2tdb3dk65m.skin
juniper.fit
eurosirel.info
web-cfe.one
a48268104.top
darkoxygen.info
beautysideup.shop
solar-battery-34557.bond
dib57.top
apihoki.live
cinholiao3.click
binxbress-bd-w8-em.shop
car-loans-78152.bond
cypher.casino
go88l.club
youyou0612.cfd
car-deals-93792.bond
ft0722a9usj38.shop
zxxzaanm.top
getc.pro
son37.club
bakingcourse01.today
refpalhsdx.top
sweethome4.buzz
yaqpqljcwmhesaj.buzz
gsolartech.com
nw0qbr.top
sakanatei.net
home-care-access-new-promo.bond
llama3-2video.net
douromaintenance.info
joycasino-hem.top
cg-qu.xyz
bogotienda.online
010jcgk.com
solar-systems-panels-50320.bond
cosmetics-30710.bond
pgfnrecuperacao.store
imples.live
bnckdaae.top
silviarusina.shop
krainedating.info
maskverifyemail.online
ttrading.pro
trendy-style.store
miranda-j.online
030003741.xyz
hoteldanibaan.info
zunica.shop
ftth.monster
c87xy374jt.bond
yhy05.cfd
blueoceanfilm.institute
lapostehotel.one
Signatures
-
Formbook family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3582532709-2637047242-3508314386-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\skype\\skype.exe," reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3582532709-2637047242-3508314386-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\skype\\skype.exe," reg.exe -
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/6040-26-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2400-32-0x0000000000710000-0x000000000073F000-memory.dmp formbook -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3260 skype.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3260 set thread context of 6040 3260 skype.exe 98 PID 6040 set thread context of 3292 6040 AddInProcess32.exe 52 PID 2400 set thread context of 3292 2400 msiexec.exe 52 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nouacomandapdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4956 PING.EXE 5492 cmd.exe 2708 cmd.exe 4860 PING.EXE 3468 PING.EXE 3628 cmd.exe 6036 PING.EXE -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 4956 PING.EXE 4860 PING.EXE 3468 PING.EXE 6036 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5616 nouacomandapdf.exe 5616 nouacomandapdf.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3300 skype.exe 3260 skype.exe 3260 skype.exe 3260 skype.exe 6040 AddInProcess32.exe 6040 AddInProcess32.exe 6040 AddInProcess32.exe 6040 AddInProcess32.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe 2400 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3292 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 6040 AddInProcess32.exe 6040 AddInProcess32.exe 6040 AddInProcess32.exe 2400 msiexec.exe 2400 msiexec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5616 nouacomandapdf.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 5616 nouacomandapdf.exe Token: SeDebugPrivilege 3300 skype.exe Token: SeDebugPrivilege 3260 skype.exe Token: SeDebugPrivilege 6040 AddInProcess32.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeDebugPrivilege 2400 msiexec.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3292 Explorer.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 5616 wrote to memory of 5492 5616 nouacomandapdf.exe 83 PID 5616 wrote to memory of 5492 5616 nouacomandapdf.exe 83 PID 5616 wrote to memory of 5492 5616 nouacomandapdf.exe 83 PID 5492 wrote to memory of 4956 5492 cmd.exe 85 PID 5492 wrote to memory of 4956 5492 cmd.exe 85 PID 5492 wrote to memory of 4956 5492 cmd.exe 85 PID 5616 wrote to memory of 3300 5616 nouacomandapdf.exe 86 PID 5616 wrote to memory of 3300 5616 nouacomandapdf.exe 86 PID 5616 wrote to memory of 3300 5616 nouacomandapdf.exe 86 PID 3300 wrote to memory of 2708 3300 skype.exe 88 PID 3300 wrote to memory of 2708 3300 skype.exe 88 PID 3300 wrote to memory of 2708 3300 skype.exe 88 PID 2708 wrote to memory of 4860 2708 cmd.exe 90 PID 2708 wrote to memory of 4860 2708 cmd.exe 90 PID 2708 wrote to memory of 4860 2708 cmd.exe 90 PID 3300 wrote to memory of 3628 3300 skype.exe 91 PID 3300 wrote to memory of 3628 3300 skype.exe 91 PID 3300 wrote to memory of 3628 3300 skype.exe 91 PID 3628 wrote to memory of 3468 3628 cmd.exe 93 PID 3628 wrote to memory of 3468 3628 cmd.exe 93 PID 3628 wrote to memory of 3468 3628 cmd.exe 93 PID 5492 wrote to memory of 3732 5492 cmd.exe 94 PID 5492 wrote to memory of 3732 5492 cmd.exe 94 PID 5492 wrote to memory of 3732 5492 cmd.exe 94 PID 2708 wrote to memory of 2368 2708 cmd.exe 95 PID 2708 wrote to memory of 2368 2708 cmd.exe 95 PID 2708 wrote to memory of 2368 2708 cmd.exe 95 PID 3628 wrote to memory of 6036 3628 cmd.exe 96 PID 3628 wrote to memory of 6036 3628 cmd.exe 96 PID 3628 wrote to memory of 6036 3628 cmd.exe 96 PID 3628 wrote to memory of 3260 3628 cmd.exe 97 PID 3628 wrote to memory of 3260 3628 cmd.exe 97 PID 3628 wrote to memory of 3260 3628 cmd.exe 97 PID 3260 wrote to memory of 6040 3260 skype.exe 98 PID 3260 wrote to memory of 6040 3260 skype.exe 98 PID 3260 wrote to memory of 6040 3260 skype.exe 98 PID 3260 wrote to memory of 6040 3260 skype.exe 98 PID 3260 wrote to memory of 6040 3260 skype.exe 98 PID 3260 wrote to memory of 6040 3260 skype.exe 98 PID 3292 wrote to memory of 2400 3292 Explorer.EXE 99 PID 3292 wrote to memory of 2400 3292 Explorer.EXE 99 PID 3292 wrote to memory of 2400 3292 Explorer.EXE 99 PID 2400 wrote to memory of 680 2400 msiexec.exe 100 PID 2400 wrote to memory of 680 2400 msiexec.exe 100 PID 2400 wrote to memory of 680 2400 msiexec.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\nouacomandapdf.exe"C:\Users\Admin\AppData\Local\Temp\nouacomandapdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5616 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 64⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4956
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:3732
-
-
-
C:\Users\Admin\AppData\Local\Temp\skype.exe"C:\Users\Admin\AppData\Local\Temp\skype.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 85⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4860
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"5⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 8 > nul && copy "C:\Users\Admin\AppData\Local\Temp\skype.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe" && ping 127.0.0.1 -n 8 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 85⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3468
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 85⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6036
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:6040
-
-
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538f9ca5f5570b79d641379bc47045d9f
SHA10b3abd00af27221ba7484dbfada386a43999ceec
SHA2569a4190a061a7378583003062d80fe7732edb00458b0064fbd8f3c46ceffbcd93
SHA512a12e1179940b7b7fc0e005d9311d1c2c02a87698f0c51de3f37ed503b3c3c70c5f30f53473b9d21c35daa8bc8199b0461d760648d56bd8961436e92fea30389b
-
Filesize
654KB
MD5ceca2dff2ddf27ee53ad866b23535b48
SHA1d9012c547137e1c643b436a25feab998a3a49c52
SHA256f3398e6a171a2dc31c171813aba4aba9e9d81921a65151f8c16d63df8e638c88
SHA512d37171eb6ac5ce0b4359911fee958daeecf5520a52dfc7fbf026c63eab12f7c68f2bc75f7efb0b2c0eac41877399bebcf81db7296b969a2777330cf6dba74ec2