Resubmissions
10-08-2020 08:42
200810-12br5knqes 10Analysis
-
max time kernel
148s -
max time network
66s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
10-08-2020 08:42
Static task
static1
Behavioral task
behavioral1
Sample
N5teSBoBlVySUoq.exe
Resource
win7v200722
General
-
Target
N5teSBoBlVySUoq.exe
-
Size
501KB
-
MD5
6c914ab41b3b8fcd47d2b52458aa98ac
-
SHA1
dc01e0c3bca0facd2f4838ac42b94ff0c3c88bd1
-
SHA256
2d8474bdd8b6122aa79a3b86f729f9aa4f83a2ccf6a51ab510d753b47fc01189
-
SHA512
44cb0d199025cbf4bc6b6fedca53bc6aed9f676c436ded8a88eefef12a846d3ed8fb612bc9713cea6a7bd2d07fac88a009e1c659379cec43aa571fa69d800984
Malware Config
Extracted
formbook
http://www.mansiobok.info/h8ofs/
totum-community.com
fintechguardian.com
playwithyourkid.com
jeanstrousers.com
alimentosprobioticos.com
innovationembassies.net
qmfwig.men
choose-vida.com
mcmontagem.com
2math4all.com
ubersize.com
epicmediasv.com
kombipetektemizligi.com
provinsijawabarat.com
godhasanaddress.com
neural.link
mobiola.biz
kuckoorock.com
hideawaytrails.com
coolbrunettegirlsvideo.site
jxhjjzzh.com
pakamuros.com
newauthenticbags.com
jinyuehui.net
jhfgjsjt.com
vyrescape.com
shampoornatvs.com
malverndoghouse.com
hocaffiliate.com
sikhantiques.com
ccrealtyonline.com
saborregional.com
dnw0cm.info
maixinyikao.com
crossofthefaithfull.com
sharethin.com
gazianteporuspulari.com
ramleelatours.com
265music.com
017opebet.com
multisklep.com
apple-mails.com
sianbyford.com
butteyoungprofessionals.com
eooulh.info
obatlancarasi.com
cheapairmaxtnshoessale.com
dt-anesthesia.com
simplyhcf.com
chinasscdus.com
elpris.online
chalkhandsmusic.com
carreraspurapasioncup.com
artcloudsap.com
xrankx.com
custommetalfinishing.com
gracegermanshepherds.net
guoyouzichan.com
12314severliest.com
js-cosou.com
solvisconsulting.net
cstrding.com
aheadsman.com
missusfit.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1908-8-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1908-8-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1908-9-0x000000000041ED70-mapping.dmp formbook behavioral1/memory/1648-10-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1628 cmd.exe -
Processes:
Explorer.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
Processes:
N5teSBoBlVySUoq.exeN5teSBoBlVySUoq.exerundll32.exedescription pid Process procid_target PID 752 set thread context of 1908 752 N5teSBoBlVySUoq.exe 28 PID 1908 set thread context of 1364 1908 N5teSBoBlVySUoq.exe 20 PID 1648 set thread context of 1364 1648 rundll32.exe 20 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
N5teSBoBlVySUoq.exerundll32.exepid Process 1908 N5teSBoBlVySUoq.exe 1908 N5teSBoBlVySUoq.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
N5teSBoBlVySUoq.exerundll32.exepid Process 1908 N5teSBoBlVySUoq.exe 1908 N5teSBoBlVySUoq.exe 1908 N5teSBoBlVySUoq.exe 1648 rundll32.exe 1648 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
N5teSBoBlVySUoq.exerundll32.exedescription pid Process Token: SeDebugPrivilege 1908 N5teSBoBlVySUoq.exe Token: SeDebugPrivilege 1648 rundll32.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid Process 1364 Explorer.EXE 1364 Explorer.EXE 1364 Explorer.EXE 1364 Explorer.EXE 1364 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid Process 1364 Explorer.EXE 1364 Explorer.EXE 1364 Explorer.EXE 1364 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
N5teSBoBlVySUoq.exeExplorer.EXErundll32.exedescription pid Process procid_target PID 752 wrote to memory of 1816 752 N5teSBoBlVySUoq.exe 24 PID 752 wrote to memory of 1816 752 N5teSBoBlVySUoq.exe 24 PID 752 wrote to memory of 1816 752 N5teSBoBlVySUoq.exe 24 PID 752 wrote to memory of 1816 752 N5teSBoBlVySUoq.exe 24 PID 752 wrote to memory of 1908 752 N5teSBoBlVySUoq.exe 28 PID 752 wrote to memory of 1908 752 N5teSBoBlVySUoq.exe 28 PID 752 wrote to memory of 1908 752 N5teSBoBlVySUoq.exe 28 PID 752 wrote to memory of 1908 752 N5teSBoBlVySUoq.exe 28 PID 752 wrote to memory of 1908 752 N5teSBoBlVySUoq.exe 28 PID 752 wrote to memory of 1908 752 N5teSBoBlVySUoq.exe 28 PID 752 wrote to memory of 1908 752 N5teSBoBlVySUoq.exe 28 PID 1364 wrote to memory of 1648 1364 Explorer.EXE 29 PID 1364 wrote to memory of 1648 1364 Explorer.EXE 29 PID 1364 wrote to memory of 1648 1364 Explorer.EXE 29 PID 1364 wrote to memory of 1648 1364 Explorer.EXE 29 PID 1364 wrote to memory of 1648 1364 Explorer.EXE 29 PID 1364 wrote to memory of 1648 1364 Explorer.EXE 29 PID 1364 wrote to memory of 1648 1364 Explorer.EXE 29 PID 1648 wrote to memory of 1628 1648 rundll32.exe 30 PID 1648 wrote to memory of 1628 1648 rundll32.exe 30 PID 1648 wrote to memory of 1628 1648 rundll32.exe 30 PID 1648 wrote to memory of 1628 1648 rundll32.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\N5teSBoBlVySUoq.exe"C:\Users\Admin\AppData\Local\Temp\N5teSBoBlVySUoq.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zaXeAacuXXqx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF17F.tmp"3⤵
- Creates scheduled task(s)
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\N5teSBoBlVySUoq.exe"C:\Users\Admin\AppData\Local\Temp\N5teSBoBlVySUoq.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\N5teSBoBlVySUoq.exe"3⤵
- Deletes itself
PID:1628
-
-