Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
proforma Invoice .exe
Resource
win7-20240508-en
General
-
Target
proforma Invoice .exe
-
Size
599KB
-
MD5
c675e7853c9cc47e31e436fe90448445
-
SHA1
47bf1af77eb9a18a70fc8e81d9caf4c466665576
-
SHA256
cdedbe45cbd9452a80416dc72dfe935c606d15cf4ebce3861ce428ab75aec7f3
-
SHA512
ba997897a7525b0e41c81c5056a120fb7566c8a0a632d04bafb190032f9843dfaa3f9b38c2f1831b102afaa7e10c29550a806aba47517ff233f6006ad8e24398
-
SSDEEP
12288:aX2qoF8gj58OR+3yKtIg51MRWDkuYRYPIBwhlIwUFg7dA:adgWOeyKqI1DKaPKwhl+FgBA
Malware Config
Extracted
formbook
4.1
pep
whitelabelgraphics.pro
futureguidefilms.com
mission-duplex.com
rutherealty.com
acehardwaremall.com
potenb.com
tbhawt.com
momentum-ip.group
m8sr8s.com
cfwagner.com
umiyama-eri.com
klantenvinden.com
simplycasd.com
visionhomerecruiting.com
inkjet-material.com
banking-aib.com
fast1performance.com
eventsbyja.com
breuer.network
smartecelectronics.com
vtbunkie.com
lexingtonclarke.com
ayintapbaklava.com
sugarstyleearrings.com
caiyanxi.com
the2mblueprint.com
bakldx.com
7choicesar.com
jesusencounterminisries.com
lamptail.com
bobkeet.com
chasingplanet.com
obernix.com
managementgpus.mobi
tcunionnet.com
hydzonised.com
jennie-espy.com
animeinkcon.com
hesovery.cool
bvilifemagazine.com
medicareworldnewsreport.net
zdrowykon.com
atenmedilatam.com
dlasso.com
7si3.com
seasonedsupport.com
29essentials.com
cnpuhang.com
yyaa2.net
neocareadvisory.com
tblsportshoes.com
chohub.com
initiationpodcast.com
architex.info
jamietylerlee.com
diusae.com
sun-go24.com
rfeap.com
safunerepublic.com
juanluanzi.com
neptuneribs.com
defocasc.com
tatilingerie.com
all-env.com
triumphantlytransformedbk.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3228-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3228-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3228-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
proforma Invoice .exeproforma Invoice .exewscript.exedescription pid process target process PID 540 set thread context of 3228 540 proforma Invoice .exe proforma Invoice .exe PID 3228 set thread context of 3408 3228 proforma Invoice .exe Explorer.EXE PID 3228 set thread context of 3408 3228 proforma Invoice .exe Explorer.EXE PID 1336 set thread context of 3408 1336 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
proforma Invoice .exeproforma Invoice .exewscript.exepid process 540 proforma Invoice .exe 540 proforma Invoice .exe 540 proforma Invoice .exe 540 proforma Invoice .exe 3228 proforma Invoice .exe 3228 proforma Invoice .exe 3228 proforma Invoice .exe 3228 proforma Invoice .exe 3228 proforma Invoice .exe 3228 proforma Invoice .exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe 1336 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
proforma Invoice .exewscript.exepid process 3228 proforma Invoice .exe 3228 proforma Invoice .exe 3228 proforma Invoice .exe 3228 proforma Invoice .exe 1336 wscript.exe 1336 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
proforma Invoice .exeproforma Invoice .exewscript.exedescription pid process Token: SeDebugPrivilege 540 proforma Invoice .exe Token: SeDebugPrivilege 3228 proforma Invoice .exe Token: SeDebugPrivilege 1336 wscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3408 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
proforma Invoice .exeExplorer.EXEwscript.exedescription pid process target process PID 540 wrote to memory of 4780 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 4780 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 4780 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 244 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 244 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 244 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 3228 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 3228 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 3228 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 3228 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 3228 540 proforma Invoice .exe proforma Invoice .exe PID 540 wrote to memory of 3228 540 proforma Invoice .exe proforma Invoice .exe PID 3408 wrote to memory of 1336 3408 Explorer.EXE wscript.exe PID 3408 wrote to memory of 1336 3408 Explorer.EXE wscript.exe PID 3408 wrote to memory of 1336 3408 Explorer.EXE wscript.exe PID 1336 wrote to memory of 1436 1336 wscript.exe cmd.exe PID 1336 wrote to memory of 1436 1336 wscript.exe cmd.exe PID 1336 wrote to memory of 1436 1336 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\proforma Invoice .exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/540-6-0x0000000005A40000-0x0000000005A96000-memory.dmpFilesize
344KB
-
memory/540-8-0x00000000058D0000-0x00000000058DA000-memory.dmpFilesize
40KB
-
memory/540-2-0x0000000005660000-0x00000000056FC000-memory.dmpFilesize
624KB
-
memory/540-3-0x0000000005CB0000-0x0000000006254000-memory.dmpFilesize
5.6MB
-
memory/540-4-0x00000000057A0000-0x0000000005832000-memory.dmpFilesize
584KB
-
memory/540-5-0x0000000005740000-0x000000000574A000-memory.dmpFilesize
40KB
-
memory/540-1-0x0000000000D90000-0x0000000000E2C000-memory.dmpFilesize
624KB
-
memory/540-7-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/540-14-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/540-9-0x000000007514E000-0x000000007514F000-memory.dmpFilesize
4KB
-
memory/540-10-0x0000000075140000-0x00000000758F0000-memory.dmpFilesize
7.7MB
-
memory/540-11-0x0000000006460000-0x00000000064C2000-memory.dmpFilesize
392KB
-
memory/540-0-0x000000007514E000-0x000000007514F000-memory.dmpFilesize
4KB
-
memory/1336-24-0x0000000000A50000-0x0000000000A77000-memory.dmpFilesize
156KB
-
memory/1336-25-0x0000000000A50000-0x0000000000A77000-memory.dmpFilesize
156KB
-
memory/3228-12-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3228-18-0x00000000015E0000-0x00000000015F4000-memory.dmpFilesize
80KB
-
memory/3228-17-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3228-21-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3228-22-0x0000000001630000-0x0000000001644000-memory.dmpFilesize
80KB
-
memory/3228-15-0x0000000001190000-0x00000000014DA000-memory.dmpFilesize
3.3MB
-
memory/3408-23-0x0000000008BC0000-0x0000000008D5B000-memory.dmpFilesize
1.6MB
-
memory/3408-19-0x00000000030E0000-0x00000000031BD000-memory.dmpFilesize
884KB
-
memory/3408-27-0x00000000030E0000-0x00000000031BD000-memory.dmpFilesize
884KB
-
memory/3408-28-0x0000000008680000-0x0000000008810000-memory.dmpFilesize
1.6MB
-
memory/3408-29-0x0000000008BC0000-0x0000000008D5B000-memory.dmpFilesize
1.6MB
-
memory/3408-32-0x0000000008680000-0x0000000008810000-memory.dmpFilesize
1.6MB