Analysis
-
max time kernel
42s -
max time network
121s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
26-11-2020 06:45
Static task
static1
Behavioral task
behavioral1
Sample
PO# 4415902670.exe
Resource
win7v20201028
General
-
Target
PO# 4415902670.exe
-
Size
542KB
-
MD5
058e6f06a51e22bbc975eecf35c34844
-
SHA1
638f4727a99bb389e8e6a77c4fbee17bdc19fc60
-
SHA256
ad644da69f848609475d2a3d773eadf646d4c1e1cb20e4b87422d224e2ccbe32
-
SHA512
0b04ed15c05b5c5791c8cc5478219e82e9f5def8d9d4f445ef03f3b39a8a76b7e28e7312914624c35b578a74927230e5e0f52c2039cd45db0047da255e15669e
Malware Config
Extracted
formbook
http://www.klingenwacht.com/mlg/
xintianpx.com
chrispsheehan.com
sensationallyot.com
veloceda.com
fanoosbattery.com
wenda7.com
cultivatecultura.com
mersinci.com
makeupbrushhes.com
vptexpediters.com
hispoemin.com
mikeshouseofathousandlegs.com
dealclosersplayback.com
knightdalesleeps.com
1uprealestate.com
showeraccessory.com
perthpanelbeaters.com
novergi.com
directmultiservice.com
mi-miftahurrohmah.com
thiswordpress.com
5gtelephonics.com
laprude.com
iyojuzn.com
delibroysusoficios.com
waterloowools.com
cleva21travels.com
origogin.com
packalunchandbreakfasttoo.com
zeusorg.com
icyblossom.com
mhs1.online
heatherseeds.com
dulichdanang365.com
thtattoo.com
rethinkingusers.com
pornumb.com
accountrestorer.com
alohabeautybaracademy.net
shoesiin.com
foxlawgroupus.com
tiempodepartida.com
todoparazurdos.store
virtual-tokyotower.com
masteringrwe.com
katrinehorn-coaching.com
enviroid.com
bienliveryleasing.com
nwflworkcomp.com
pineridgepark-mhp.com
xrecalverk.com
comfortablelifestyle.net
berkeleyreese.com
xperienciasdigitales.online
suzukazerunnadiet.com
healthyguthealthyhorse.com
arappbuilder.com
newyorksustainability.com
adaptiveetfs.com
peteasmus.com
collegecheergear.com
cdesign.digital
sonicetalon.com
espidargym.com
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1324 created 3712 1324 WerFault.exe mscorsvw.exe -
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3712-11-0x000000000041EB50-mapping.dmp formbook behavioral2/memory/3712-12-0x0000000000770000-0x000000000079E000-memory.dmp formbook behavioral2/memory/3712-14-0x000000000041EB50-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO# 4415902670.exedescription pid process target process PID 732 set thread context of 3712 732 PO# 4415902670.exe mscorsvw.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1324 3712 WerFault.exe mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
PO# 4415902670.exeWerFault.exedescription pid process Token: SeDebugPrivilege 732 PO# 4415902670.exe Token: SeRestorePrivilege 1324 WerFault.exe Token: SeBackupPrivilege 1324 WerFault.exe Token: SeDebugPrivilege 1324 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
PO# 4415902670.exedescription pid process target process PID 732 wrote to memory of 3712 732 PO# 4415902670.exe mscorsvw.exe PID 732 wrote to memory of 3712 732 PO# 4415902670.exe mscorsvw.exe PID 732 wrote to memory of 3712 732 PO# 4415902670.exe mscorsvw.exe PID 732 wrote to memory of 3712 732 PO# 4415902670.exe mscorsvw.exe PID 732 wrote to memory of 3712 732 PO# 4415902670.exe mscorsvw.exe PID 732 wrote to memory of 3712 732 PO# 4415902670.exe mscorsvw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO# 4415902670.exe"C:\Users\Admin\AppData\Local\Temp\PO# 4415902670.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 1763⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/732-7-0x00000000074E0000-0x00000000074E1000-memory.dmpFilesize
4KB
-
memory/732-0-0x00000000730E0000-0x00000000737CE000-memory.dmpFilesize
6.9MB
-
memory/732-3-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/732-4-0x00000000026B0000-0x00000000026C7000-memory.dmpFilesize
92KB
-
memory/732-5-0x0000000004BF0000-0x0000000004C0F000-memory.dmpFilesize
124KB
-
memory/732-6-0x0000000007900000-0x0000000007901000-memory.dmpFilesize
4KB
-
memory/732-1-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/732-8-0x00000000074C0000-0x00000000074CA000-memory.dmpFilesize
40KB
-
memory/732-9-0x0000000007F00000-0x0000000007F01000-memory.dmpFilesize
4KB
-
memory/1324-13-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/1324-16-0x0000000005330000-0x0000000005331000-memory.dmpFilesize
4KB
-
memory/3712-11-0x000000000041EB50-mapping.dmp
-
memory/3712-12-0x0000000000770000-0x000000000079E000-memory.dmpFilesize
184KB
-
memory/3712-14-0x000000000041EB50-mapping.dmp