Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
proforma Invoice .exe
Resource
win7-20240508-en
General
-
Target
proforma Invoice .exe
-
Size
599KB
-
MD5
c675e7853c9cc47e31e436fe90448445
-
SHA1
47bf1af77eb9a18a70fc8e81d9caf4c466665576
-
SHA256
cdedbe45cbd9452a80416dc72dfe935c606d15cf4ebce3861ce428ab75aec7f3
-
SHA512
ba997897a7525b0e41c81c5056a120fb7566c8a0a632d04bafb190032f9843dfaa3f9b38c2f1831b102afaa7e10c29550a806aba47517ff233f6006ad8e24398
-
SSDEEP
12288:aX2qoF8gj58OR+3yKtIg51MRWDkuYRYPIBwhlIwUFg7dA:adgWOeyKqI1DKaPKwhl+FgBA
Malware Config
Extracted
formbook
4.1
pep
whitelabelgraphics.pro
futureguidefilms.com
mission-duplex.com
rutherealty.com
acehardwaremall.com
potenb.com
tbhawt.com
momentum-ip.group
m8sr8s.com
cfwagner.com
umiyama-eri.com
klantenvinden.com
simplycasd.com
visionhomerecruiting.com
inkjet-material.com
banking-aib.com
fast1performance.com
eventsbyja.com
breuer.network
smartecelectronics.com
vtbunkie.com
lexingtonclarke.com
ayintapbaklava.com
sugarstyleearrings.com
caiyanxi.com
the2mblueprint.com
bakldx.com
7choicesar.com
jesusencounterminisries.com
lamptail.com
bobkeet.com
chasingplanet.com
obernix.com
managementgpus.mobi
tcunionnet.com
hydzonised.com
jennie-espy.com
animeinkcon.com
hesovery.cool
bvilifemagazine.com
medicareworldnewsreport.net
zdrowykon.com
atenmedilatam.com
dlasso.com
7si3.com
seasonedsupport.com
29essentials.com
cnpuhang.com
yyaa2.net
neocareadvisory.com
tblsportshoes.com
chohub.com
initiationpodcast.com
architex.info
jamietylerlee.com
diusae.com
sun-go24.com
rfeap.com
safunerepublic.com
juanluanzi.com
neptuneribs.com
defocasc.com
tatilingerie.com
all-env.com
triumphantlytransformedbk.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2824-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2824-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1572 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
proforma Invoice .exeproforma Invoice .execmd.exedescription pid process target process PID 1252 set thread context of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 2824 set thread context of 1184 2824 proforma Invoice .exe Explorer.EXE PID 2964 set thread context of 1184 2964 cmd.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
proforma Invoice .execmd.exepid process 2824 proforma Invoice .exe 2824 proforma Invoice .exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe 2964 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
proforma Invoice .execmd.exepid process 2824 proforma Invoice .exe 2824 proforma Invoice .exe 2824 proforma Invoice .exe 2964 cmd.exe 2964 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
proforma Invoice .execmd.exedescription pid process Token: SeDebugPrivilege 2824 proforma Invoice .exe Token: SeDebugPrivilege 2964 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
proforma Invoice .exeExplorer.EXEcmd.exedescription pid process target process PID 1252 wrote to memory of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 1252 wrote to memory of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 1252 wrote to memory of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 1252 wrote to memory of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 1252 wrote to memory of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 1252 wrote to memory of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 1252 wrote to memory of 2824 1252 proforma Invoice .exe proforma Invoice .exe PID 1184 wrote to memory of 2964 1184 Explorer.EXE cmd.exe PID 1184 wrote to memory of 2964 1184 Explorer.EXE cmd.exe PID 1184 wrote to memory of 2964 1184 Explorer.EXE cmd.exe PID 1184 wrote to memory of 2964 1184 Explorer.EXE cmd.exe PID 2964 wrote to memory of 1572 2964 cmd.exe cmd.exe PID 2964 wrote to memory of 1572 2964 cmd.exe cmd.exe PID 2964 wrote to memory of 1572 2964 cmd.exe cmd.exe PID 2964 wrote to memory of 1572 2964 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1184-17-0x0000000003A70000-0x0000000003B70000-memory.dmpFilesize
1024KB
-
memory/1184-23-0x0000000004E90000-0x0000000004FC2000-memory.dmpFilesize
1.2MB
-
memory/1184-18-0x0000000004E90000-0x0000000004FC2000-memory.dmpFilesize
1.2MB
-
memory/1252-5-0x0000000074340000-0x0000000074A2E000-memory.dmpFilesize
6.9MB
-
memory/1252-12-0x0000000074340000-0x0000000074A2E000-memory.dmpFilesize
6.9MB
-
memory/1252-0-0x000000007434E000-0x000000007434F000-memory.dmpFilesize
4KB
-
memory/1252-6-0x0000000004C20000-0x0000000004C82000-memory.dmpFilesize
392KB
-
memory/1252-1-0x0000000000B90000-0x0000000000C2C000-memory.dmpFilesize
624KB
-
memory/1252-4-0x000000007434E000-0x000000007434F000-memory.dmpFilesize
4KB
-
memory/1252-2-0x0000000074340000-0x0000000074A2E000-memory.dmpFilesize
6.9MB
-
memory/1252-3-0x0000000000690000-0x000000000069A000-memory.dmpFilesize
40KB
-
memory/2824-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2824-13-0x0000000000C30000-0x0000000000F33000-memory.dmpFilesize
3.0MB
-
memory/2824-16-0x0000000000280000-0x0000000000294000-memory.dmpFilesize
80KB
-
memory/2824-15-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2824-11-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2824-8-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2824-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2964-19-0x0000000049EB0000-0x0000000049EFC000-memory.dmpFilesize
304KB
-
memory/2964-21-0x0000000049EB0000-0x0000000049EFC000-memory.dmpFilesize
304KB