Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
ORDER #8774598644.pdf.exe
Resource
win7-20231129-en
General
-
Target
ORDER #8774598644.pdf.exe
-
Size
1.0MB
-
MD5
2d3ee28273908c49fd61b2b682a77d7c
-
SHA1
52a9468e0a9815e6d4567de69e0fd46725904e26
-
SHA256
7775c0292610f35e3db09d7e06343f212a24e490085ee11f8121fa65db61dcfa
-
SHA512
38691df68b324fed73fcbffe369acce07d2ef948dfdedf40802ff73522c32b3c7f57de1a132d1b8d9e8b89f3d3fd1631411228bf2794d3e5a705d6cf349365ed
-
SSDEEP
24576:6AHnh+eWsN3skA4RV1Hom2KXMmHathMXQKuyroqVL5:Nh+ZkldoPK8YathMQK5oi
Malware Config
Extracted
formbook
4.1
rn94
st68v.xyz
conciergenotary.net
qwechaotk.top
rtpdonatoto29.xyz
8ad.xyz
powermove.top
cameras-30514.bond
vanguardcoffee.shop
umoe53fxc1bsujv.buzz
consultoriamax.net
hplxx.com
ndu.wtf
yzh478c.xyz
bigbrown999.site
xiake07.asia
resdai.xyz
the35678.shop
ba6rf.rest
ceo688.com
phimxhot.xyz
010101-11122-2222.cloud
champion-casino-skw.buzz
laku77.bar
popumail.net
stargazerastrology.click
beauty.university
t460.top
sparkyos.app
day2go.net
minrungis.shop
cognigrid.com
abandoned-houses-39863.bond
liderparti.store
hinet.tech
moviemax.live
business-printer-22001.bond
yakintv.pro
longmaosol.xyz
hello4d.dev
vestircool.store
surpriseinside.net
betflixfan.asia
ln2m1.shop
5302mcavt.website
conf-contact.online
31140.ooo
bdkasinoxox.xyz
nicoleb.tech
mainz-cruise-deals.today
run-run.tokyo
practicalfranchises.info
usmanovbanki-uz.space
superlottery.top
zabbet911.bet
ambassadorshipvottings.click
sangforln.tech
expertoffersusa.lat
plong.cloud
cryptoautomata.dev
dq33xa.xyz
handtools-16660.bond
24763wbk.hair
sportswear-30530.bond
lusuidnx.shop
laske.xyz
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2288-30-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2288-33-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2660-39-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Drops startup file 1 IoCs
Processes:
name.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
Processes:
name.exepid process 2228 name.exe -
Loads dropped DLL 1 IoCs
Processes:
ORDER #8774598644.pdf.exepid process 2360 ORDER #8774598644.pdf.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Local\directory\name.exe autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
name.exesvchost.exesystray.exedescription pid process target process PID 2228 set thread context of 2288 2228 name.exe svchost.exe PID 2288 set thread context of 1372 2288 svchost.exe Explorer.EXE PID 2660 set thread context of 1372 2660 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
svchost.exesystray.exepid process 2288 svchost.exe 2288 svchost.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe 2660 systray.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
name.exesvchost.exesystray.exepid process 2228 name.exe 2288 svchost.exe 2288 svchost.exe 2288 svchost.exe 2660 systray.exe 2660 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exesystray.exedescription pid process Token: SeDebugPrivilege 2288 svchost.exe Token: SeDebugPrivilege 2660 systray.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
ORDER #8774598644.pdf.exename.exeExplorer.EXEpid process 2360 ORDER #8774598644.pdf.exe 2360 ORDER #8774598644.pdf.exe 2228 name.exe 2228 name.exe 1372 Explorer.EXE 1372 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
ORDER #8774598644.pdf.exename.exepid process 2360 ORDER #8774598644.pdf.exe 2360 ORDER #8774598644.pdf.exe 2228 name.exe 2228 name.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
ORDER #8774598644.pdf.exename.exeExplorer.EXEsystray.exedescription pid process target process PID 2360 wrote to memory of 2228 2360 ORDER #8774598644.pdf.exe name.exe PID 2360 wrote to memory of 2228 2360 ORDER #8774598644.pdf.exe name.exe PID 2360 wrote to memory of 2228 2360 ORDER #8774598644.pdf.exe name.exe PID 2360 wrote to memory of 2228 2360 ORDER #8774598644.pdf.exe name.exe PID 2228 wrote to memory of 2288 2228 name.exe svchost.exe PID 2228 wrote to memory of 2288 2228 name.exe svchost.exe PID 2228 wrote to memory of 2288 2228 name.exe svchost.exe PID 2228 wrote to memory of 2288 2228 name.exe svchost.exe PID 2228 wrote to memory of 2288 2228 name.exe svchost.exe PID 1372 wrote to memory of 2660 1372 Explorer.EXE systray.exe PID 1372 wrote to memory of 2660 1372 Explorer.EXE systray.exe PID 1372 wrote to memory of 2660 1372 Explorer.EXE systray.exe PID 1372 wrote to memory of 2660 1372 Explorer.EXE systray.exe PID 2660 wrote to memory of 2876 2660 systray.exe cmd.exe PID 2660 wrote to memory of 2876 2660 systray.exe cmd.exe PID 2660 wrote to memory of 2876 2660 systray.exe cmd.exe PID 2660 wrote to memory of 2876 2660 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ORDER #8774598644.pdf.exe"C:\Users\Admin\AppData\Local\Temp\ORDER #8774598644.pdf.exe"2⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\ORDER #8774598644.pdf.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ORDER #8774598644.pdf.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\holloingFilesize
185KB
MD59bde92e31dd0f172cf097edbf96c0f87
SHA10a49b0e0f811ac1c030dd1dc72faee354a1b9723
SHA25630022f1c166da506a82b58818ef29e243b06cde429ad5486e44d9f34e0465a9a
SHA512acfe7cc000e4b25c8126500ece114c44b13f08d2754a6d4fa9fe39becf6ffd2012ef16ccc41178c7e3f8d6a82539c4e2140b11cbc20506ca511e03020480afb4
-
C:\Users\Admin\AppData\Local\Temp\overfertilizeFilesize
28KB
MD5908033a74672250aeda64d4217d53f51
SHA1a5ba1de8ee9d453ee8690f104fed7b68e26d7e1d
SHA25618642b12bfa7cca8341165e50812f67947f830ce5c5b9b0f7bb77e0f35f80206
SHA5120df987f4b79395feef5ef53b2f4df34e044b5cc7a04858060f10c81517e30357d1670738065b076472d294f57aff564ec46e510e6a2c9cd24bb374eb8c49d3a6
-
\Users\Admin\AppData\Local\directory\name.exeFilesize
1.0MB
MD52d3ee28273908c49fd61b2b682a77d7c
SHA152a9468e0a9815e6d4567de69e0fd46725904e26
SHA2567775c0292610f35e3db09d7e06343f212a24e490085ee11f8121fa65db61dcfa
SHA51238691df68b324fed73fcbffe369acce07d2ef948dfdedf40802ff73522c32b3c7f57de1a132d1b8d9e8b89f3d3fd1631411228bf2794d3e5a705d6cf349365ed
-
memory/1372-36-0x0000000004C40000-0x0000000004D17000-memory.dmpFilesize
860KB
-
memory/1372-50-0x0000000004E70000-0x0000000004F2B000-memory.dmpFilesize
748KB
-
memory/1372-47-0x0000000004E70000-0x0000000004F2B000-memory.dmpFilesize
748KB
-
memory/1372-46-0x0000000004E70000-0x0000000004F2B000-memory.dmpFilesize
748KB
-
memory/1372-42-0x0000000004C40000-0x0000000004D17000-memory.dmpFilesize
860KB
-
memory/1372-35-0x0000000000310000-0x0000000000410000-memory.dmpFilesize
1024KB
-
memory/2288-30-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2288-33-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2288-34-0x00000000001C0000-0x00000000001D5000-memory.dmpFilesize
84KB
-
memory/2288-31-0x0000000000930000-0x0000000000C33000-memory.dmpFilesize
3.0MB
-
memory/2360-10-0x0000000000120000-0x0000000000124000-memory.dmpFilesize
16KB
-
memory/2660-38-0x00000000003B0000-0x00000000003B5000-memory.dmpFilesize
20KB
-
memory/2660-37-0x00000000003B0000-0x00000000003B5000-memory.dmpFilesize
20KB
-
memory/2660-39-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB