Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
10-08-2020 09:13
Static task
static1
Behavioral task
behavioral1
Sample
Quotationv.exe
Resource
win7
General
-
Target
Quotationv.exe
-
Size
669KB
-
MD5
52cfc15a97799e70a8b4a39b04bc8e2b
-
SHA1
2cfa4daab21dd8115167a3ccba0080f5fdad63ff
-
SHA256
f910b739d3d727fc1f5acde88b0740a575c603dc6c61246156c5debd6bd126bc
-
SHA512
95b7d0c4942703ebfec9d405bfe08efd1f11c2af3b9f65e05bef5afb3440fabcff5e5733de9bec824331d6b22c26e72419e25ca66a6948c07c0c4d4cc98fcdc3
Malware Config
Extracted
formbook
http://www.fex-tracks.com/pdup/
mycharlesschwab.com
casinocode.online
lesliemostellerart.com
cdtevergreen.com
jualpenirumasli.com
lvyouonline.com
moteaiai.com
coachmo13.com
lampungtimur.com
sellmycapecodhouse.com
wearschool.com
onlinekazancyollari.com
ubmotherhood.com
sqyxedu.com
sibate518.com
energygv.com
sathsathhain.com
paperghostsbook.com
investinbritain.net
tansuokeji.ink
quintelcapital.com
inkox.com
horsedrawnpress.com
hoertjesbijjouindebuurt.online
van-to-choice.com
undohate.com
innovativeconnections.info
xn--2qu076aq4bo3gg7hvoqohm.net
bancodecreditosyprestamos.com
xingyesq.com
8894x.com
loreet.com
studiopavia.cloud
dairong.net
timo9.com
taikang365.ink
chatterentertainment.com
apluspower.net
nelamaps.com
cryptoustaad.com
baevmaylllerch.win
saintjulia.church
caneloalvarezvsgolovkin.com
barronetttire.com
government-jobs.click
teamexitus.com
alponafashion.com
myriamavanza.com
qianxunedu.com
jglzs.com
tv-production.com
vfjgiftshop.com
timekeeper248.com
4thirteenfitnessclothing.com
motorcityam.com
hfhy888.com
kirso.info
grupoquo.com
trentgoins.net
storey360.com
xyxy4567.com
farmersinsurancematt.com
gwor5v.com
mjstfy.men
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2684-1-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2684-1-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2684-2-0x000000000041EDC0-mapping.dmp formbook behavioral2/memory/3668-4-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Quotationv.exeQuotationv.exemsdt.exedescription pid process target process PID 3056 set thread context of 2684 3056 Quotationv.exe Quotationv.exe PID 2684 set thread context of 2940 2684 Quotationv.exe Explorer.EXE PID 3668 set thread context of 2940 3668 msdt.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
Quotationv.exeQuotationv.exemsdt.exepid process 3056 Quotationv.exe 3056 Quotationv.exe 3056 Quotationv.exe 2684 Quotationv.exe 2684 Quotationv.exe 2684 Quotationv.exe 2684 Quotationv.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe 3668 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Quotationv.exemsdt.exepid process 2684 Quotationv.exe 2684 Quotationv.exe 2684 Quotationv.exe 3668 msdt.exe 3668 msdt.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
Quotationv.exeQuotationv.exemsdt.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3056 Quotationv.exe Token: SeDebugPrivilege 2684 Quotationv.exe Token: SeDebugPrivilege 3668 msdt.exe Token: SeShutdownPrivilege 2940 Explorer.EXE Token: SeCreatePagefilePrivilege 2940 Explorer.EXE Token: SeShutdownPrivilege 2940 Explorer.EXE Token: SeCreatePagefilePrivilege 2940 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Quotationv.exeExplorer.EXEmsdt.exedescription pid process target process PID 3056 wrote to memory of 2684 3056 Quotationv.exe Quotationv.exe PID 3056 wrote to memory of 2684 3056 Quotationv.exe Quotationv.exe PID 3056 wrote to memory of 2684 3056 Quotationv.exe Quotationv.exe PID 3056 wrote to memory of 2684 3056 Quotationv.exe Quotationv.exe PID 3056 wrote to memory of 2684 3056 Quotationv.exe Quotationv.exe PID 3056 wrote to memory of 2684 3056 Quotationv.exe Quotationv.exe PID 2940 wrote to memory of 3668 2940 Explorer.EXE msdt.exe PID 2940 wrote to memory of 3668 2940 Explorer.EXE msdt.exe PID 2940 wrote to memory of 3668 2940 Explorer.EXE msdt.exe PID 3668 wrote to memory of 3940 3668 msdt.exe cmd.exe PID 3668 wrote to memory of 3940 3668 msdt.exe cmd.exe PID 3668 wrote to memory of 3940 3668 msdt.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"3⤵PID:3940
-
-