Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
invoice copypdf.exe
Resource
win7-20240221-en
General
-
Target
invoice copypdf.exe
-
Size
408KB
-
MD5
d9ae02ae949ec2aba95cda647fe09240
-
SHA1
3858a6e45d0031fcbd9081dee453fdf196cc95a4
-
SHA256
75a0f38d45e726a70992f82304bfb85b127c37e591c02c59fe5750d308a95bd6
-
SHA512
f724c3ab608fdd6393147a2534d035b2211848efc091bcf73fb20ef2476a1705df9a423ccfe732903b8ed4fd6bef1d361e9881d5c767089ae2f5377049c97a46
-
SSDEEP
12288:KnzmVzil201tDwa2rGcLSY5ndlqChvqeA:KnzmVzK5S0cLSY5ndlqov
Malware Config
Extracted
formbook
4.1
mnf
freeedomfencemn.com
corse-pollens.com
gellyc.com
mindplusgrind.com
gzrikang.com
horukac.com
aswaqina.com
lawofficeofjimhankey.com
everyoneshoroscope.com
freisaq.com
khimyoga.com
usmarketingdigital.com
artistagospel.com
stop-moskitos.com
sertecbasicos.com
mvmontessori.net
duke-a-website.com
arcaneunlocked.com
turnershydrographics.com
bipbopbling.com
bailey-grey-sage.com
laplatesforme.com
resistrebel.com
adskliq.com
riyapalace.com
hxdhn.net
kentbranding.company
peninsulamatchmakers.net
haarausfall-info.com
artesanatosincero.com
unboundpublish.tech
zhongtangwealth.com
seoultechpe.com
antimohg.com
geniuslims.com
usacarkit.com
thegenvalue.com
soulpainting.vision
chituma2004.com
enjoybespokenwords.com
movetolancaster.com
igmasteryclub.com
imtheonlyperson.com
playerucas.com
service-9902.com
youronlinewholesaler.com
goodjob.ink
bdypss.com
icpropertiesllc.com
baove.info
brokerltsas.com
vikegame.info
aventurahdrealty.com
neurologistaandreialamberti.com
goatfare.com
funservicesflorida.com
infinitehandyman.net
alhemmah-store.com
janasfuncakes.com
sekolahsukses.com
ooc.xyz
gohawthorne.com
spotr.net
420cardsaz.com
jerkerings.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/452-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/452-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
invoice copypdf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation invoice copypdf.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
invoice copypdf.exeinvoice copypdf.exewscript.exedescription pid process target process PID 3936 set thread context of 452 3936 invoice copypdf.exe invoice copypdf.exe PID 452 set thread context of 3460 452 invoice copypdf.exe Explorer.EXE PID 3944 set thread context of 3460 3944 wscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
invoice copypdf.exeinvoice copypdf.exewscript.exepid process 3936 invoice copypdf.exe 452 invoice copypdf.exe 452 invoice copypdf.exe 452 invoice copypdf.exe 452 invoice copypdf.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe 3944 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
invoice copypdf.exewscript.exepid process 452 invoice copypdf.exe 452 invoice copypdf.exe 452 invoice copypdf.exe 3944 wscript.exe 3944 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
invoice copypdf.exeinvoice copypdf.exewscript.exedescription pid process Token: SeDebugPrivilege 3936 invoice copypdf.exe Token: SeDebugPrivilege 452 invoice copypdf.exe Token: SeDebugPrivilege 3944 wscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3460 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
invoice copypdf.exeExplorer.EXEwscript.exedescription pid process target process PID 3936 wrote to memory of 4792 3936 invoice copypdf.exe schtasks.exe PID 3936 wrote to memory of 4792 3936 invoice copypdf.exe schtasks.exe PID 3936 wrote to memory of 4792 3936 invoice copypdf.exe schtasks.exe PID 3936 wrote to memory of 452 3936 invoice copypdf.exe invoice copypdf.exe PID 3936 wrote to memory of 452 3936 invoice copypdf.exe invoice copypdf.exe PID 3936 wrote to memory of 452 3936 invoice copypdf.exe invoice copypdf.exe PID 3936 wrote to memory of 452 3936 invoice copypdf.exe invoice copypdf.exe PID 3936 wrote to memory of 452 3936 invoice copypdf.exe invoice copypdf.exe PID 3936 wrote to memory of 452 3936 invoice copypdf.exe invoice copypdf.exe PID 3460 wrote to memory of 3944 3460 Explorer.EXE wscript.exe PID 3460 wrote to memory of 3944 3460 Explorer.EXE wscript.exe PID 3460 wrote to memory of 3944 3460 Explorer.EXE wscript.exe PID 3944 wrote to memory of 1760 3944 wscript.exe cmd.exe PID 3944 wrote to memory of 1760 3944 wscript.exe cmd.exe PID 3944 wrote to memory of 1760 3944 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\invoice copypdf.exe"C:\Users\Admin\AppData\Local\Temp\invoice copypdf.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nojDVIgkBT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4968.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\invoice copypdf.exe"C:\Users\Admin\AppData\Local\Temp\invoice copypdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\invoice copypdf.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4968.tmpFilesize
1KB
MD5c00315c498001409003f3ec3ea642a6e
SHA14f4bce4a09e88ef241b4e5c0037d584bea878c2d
SHA25682f9fcaa11f261d144fe92861c9cd0d4d7ee5e788a4db716e3e814d3eecb23c1
SHA512361cf3290b52e682f8e35e493b222c6e00387b681fc0869330567710b44ec87336964cb6c20af45c8488ec385cd41f4830bceaa913a044c2394cd07396f40e5b
-
memory/452-15-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/452-10-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/452-13-0x0000000001710000-0x0000000001A5A000-memory.dmpFilesize
3.3MB
-
memory/452-16-0x0000000001220000-0x0000000001234000-memory.dmpFilesize
80KB
-
memory/3460-28-0x0000000008000000-0x0000000008119000-memory.dmpFilesize
1.1MB
-
memory/3460-25-0x0000000008000000-0x0000000008119000-memory.dmpFilesize
1.1MB
-
memory/3460-23-0x0000000008000000-0x0000000008119000-memory.dmpFilesize
1.1MB
-
memory/3460-21-0x0000000007EA0000-0x0000000007FF1000-memory.dmpFilesize
1.3MB
-
memory/3460-17-0x0000000007EA0000-0x0000000007FF1000-memory.dmpFilesize
1.3MB
-
memory/3936-4-0x0000000074B92000-0x0000000074B93000-memory.dmpFilesize
4KB
-
memory/3936-12-0x0000000074B90000-0x0000000075141000-memory.dmpFilesize
5.7MB
-
memory/3936-0-0x0000000074B92000-0x0000000074B93000-memory.dmpFilesize
4KB
-
memory/3936-3-0x0000000074B90000-0x0000000075141000-memory.dmpFilesize
5.7MB
-
memory/3936-2-0x0000000074B90000-0x0000000075141000-memory.dmpFilesize
5.7MB
-
memory/3936-1-0x0000000074B90000-0x0000000075141000-memory.dmpFilesize
5.7MB
-
memory/3944-19-0x0000000000DC0000-0x0000000000DE7000-memory.dmpFilesize
156KB
-
memory/3944-18-0x0000000000DC0000-0x0000000000DE7000-memory.dmpFilesize
156KB