Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 19:37
Behavioral task
behavioral1
Sample
INVOICE_#24.exe
Resource
win7v20201028
General
-
Target
INVOICE_#24.exe
-
Size
396KB
-
MD5
15fc2ccb48e28c2001728c3b92022e3b
-
SHA1
4745737dde241e42470a73303778e2ba37a6e761
-
SHA256
20b27c73d6c337c95759c21e02e1e795fb7f07413e46f053e6e728c5de342dd9
-
SHA512
e8d8d642ea33c26a6b54346a3819803fa6be37188a9fb25c33a96ff7696af5fb1c77f2de0e4bc4f26255c301b7324ea80a60c7b06e35c372a02845a306656d1b
Malware Config
Extracted
formbook
http://www.govaj.com/bd2/
coffeeflyer.com
joy-cars.com
excp0st.com
pancakesandprotein.com
teenboys.info
theperfectgiftshop.net
maomao2017.com
musiclabtacoma.com
taskrit.com
pthjxx.com
114man.com
worldsjsj.com
rjpmuztrygwn.online
casinotoponlineplay.technology
tm88z.com
navnoorkang.com
lazydogkennels.net
yisilv.com
usasubels.com
desperatehouse-lives.com
brianbertini.info
sag4bd.com
zahnarzt-rosenheim.info
newspies.com
thefinalexpensegroup.com
wwwjinsha784.com
128hao.com
abesdjc.com
majportfolio.com
travelfoodmustafa.com
indo-mart.com
funlick.net
howstevedidthat.com
katspropertymanagement.com
hzsonata.com
believers.expert
littleapple-vo.com
jmdyljuf.win
exerzonegymgt.com
huichengsl.com
keithdeanjr.com
ybntest699.com
allmandbros.com
maftfw.com
online-attestation.com
fmbzzpx.download
staramway.com
mugzshideout.net
12usy.com
immuno-naturo.com
tractoferguson.com
rjconstrucoesse.com
johnscharrett.business
1517toparis.movie
redpingwinful.net
o31y7g.download
greenwebapps.com
6pinbahis.com
shouyou168.com
globalvalueshopping.com
lfhyblm.com
maisbrasilpublicidade.com
alixzwane.com
pubwild.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/196-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/196-4-0x000000000041B660-mapping.dmp formbook behavioral2/memory/2828-5-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
INVOICE_#24.exeINVOICE_#24.execmstp.exedescription pid process target process PID 4076 set thread context of 196 4076 INVOICE_#24.exe INVOICE_#24.exe PID 196 set thread context of 2756 196 INVOICE_#24.exe Explorer.EXE PID 2828 set thread context of 2756 2828 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
INVOICE_#24.execmstp.exepid process 196 INVOICE_#24.exe 196 INVOICE_#24.exe 196 INVOICE_#24.exe 196 INVOICE_#24.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe 2828 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
INVOICE_#24.execmstp.exepid process 196 INVOICE_#24.exe 196 INVOICE_#24.exe 196 INVOICE_#24.exe 2828 cmstp.exe 2828 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
INVOICE_#24.exeINVOICE_#24.execmstp.exedescription pid process Token: SeDebugPrivilege 4076 INVOICE_#24.exe Token: SeDebugPrivilege 196 INVOICE_#24.exe Token: SeDebugPrivilege 2828 cmstp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
INVOICE_#24.exepid process 4076 INVOICE_#24.exe 4076 INVOICE_#24.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2756 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
INVOICE_#24.exeExplorer.EXEcmstp.exedescription pid process target process PID 4076 wrote to memory of 196 4076 INVOICE_#24.exe INVOICE_#24.exe PID 4076 wrote to memory of 196 4076 INVOICE_#24.exe INVOICE_#24.exe PID 4076 wrote to memory of 196 4076 INVOICE_#24.exe INVOICE_#24.exe PID 4076 wrote to memory of 196 4076 INVOICE_#24.exe INVOICE_#24.exe PID 4076 wrote to memory of 196 4076 INVOICE_#24.exe INVOICE_#24.exe PID 4076 wrote to memory of 196 4076 INVOICE_#24.exe INVOICE_#24.exe PID 2756 wrote to memory of 2828 2756 Explorer.EXE cmstp.exe PID 2756 wrote to memory of 2828 2756 Explorer.EXE cmstp.exe PID 2756 wrote to memory of 2828 2756 Explorer.EXE cmstp.exe PID 2828 wrote to memory of 3896 2828 cmstp.exe cmd.exe PID 2828 wrote to memory of 3896 2828 cmstp.exe cmd.exe PID 2828 wrote to memory of 3896 2828 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\INVOICE_#24.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE_#24.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\INVOICE_#24.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INVOICE_#24.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/196-3-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/196-4-0x000000000041B660-mapping.dmp
-
memory/2828-5-0x0000000000000000-mapping.dmp
-
memory/2828-6-0x0000000000310000-0x0000000000326000-memory.dmpFilesize
88KB
-
memory/2828-7-0x0000000000310000-0x0000000000326000-memory.dmpFilesize
88KB
-
memory/2828-9-0x0000000005650000-0x00000000057B5000-memory.dmpFilesize
1.4MB
-
memory/3896-8-0x0000000000000000-mapping.dmp