Analysis
-
max time kernel
60s -
max time network
70s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-01-2021 18:20
Static task
static1
Behavioral task
behavioral1
Sample
0e6d87f5bd5e0fc8d8ecd6949623ef02.exe
Resource
win7v20201028
General
-
Target
0e6d87f5bd5e0fc8d8ecd6949623ef02.exe
-
Size
1.1MB
-
MD5
0e6d87f5bd5e0fc8d8ecd6949623ef02
-
SHA1
4df7241a27077b6bbd8cc69efb103edb8d46cf92
-
SHA256
2fd6b2288864f3a099a32bd923f7b3c67db00c979aa2e46db125e104618e92b7
-
SHA512
8c7ab60be0fd184090c473c9759c253d054d343bf271d9ea04444e8219f82fdf63668a2d9d6d5a3851320f9624ed5087e51c30cd547f2b4ded65fed85dc57ee8
Malware Config
Extracted
formbook
http://www.thesiromiel.com/kgw/
valentinakasu.com
soyelmatador.com
collaborativeprosperity.com
power8brokers.com
nexus-ink.com
manpasandmeatmarket.com
the-ethical-forums.today
maryannpark.com
bikininbodymommy.com
pxwuo.com
bigbangmerch.com
okaysinger.com
shopcarpe.com
rainbowhillsswimclub.com
crifinmarket.com
ebl-play.net
forceandsonsequipment.com
viagraytqwi.com
latashashop.com
suffocatinglymundanepodcast.com
metanoria.com
camera-kento.com
hotsaledeals.store
outlawgospelshow.com
saisaharashipping.com
buyiprod.com
pestigenix.com
opendesignpodcast.com
patentml.com
covaxbiotech.com
youjar.com
domvy.xyz
remodelmemphis.com
milehighdistributionllc.com
merchandisingpremium.com
fallguysmovile.com
actuelburo.xyz
nedlebow.com
shopcryptocurrency247.com
riellymoore.com
affinitymotorsales.com
akmh.pro
hsrrxs.com
atlanticdentallab.com
sagarpantry.com
murinemodel.com
karybeautycare.com
boshangkeji.com
dailynewstodays.com
oregonpyramids.com
dsjmzyz.com
gidagozlemevi.com
tribelessofficial.com
cyberonica.com
onehourcheckout.com
tenaflypedatrics.com
nbworldfire.com
setyourhead.com
manticore-habitat.com
iqftomatoes.com
fejsearesete.com
gregsgradeaappliancerepair.com
sfmfgco.com
directprnews.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3364-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3364-14-0x000000000041EB70-mapping.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
0e6d87f5bd5e0fc8d8ecd6949623ef02.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
0e6d87f5bd5e0fc8d8ecd6949623ef02.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0e6d87f5bd5e0fc8d8ecd6949623ef02.exedescription pid process target process PID 828 set thread context of 3364 828 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0e6d87f5bd5e0fc8d8ecd6949623ef02.exepid process 3364 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 3364 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0e6d87f5bd5e0fc8d8ecd6949623ef02.exedescription pid process target process PID 828 wrote to memory of 3364 828 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe PID 828 wrote to memory of 3364 828 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe PID 828 wrote to memory of 3364 828 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe PID 828 wrote to memory of 3364 828 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe PID 828 wrote to memory of 3364 828 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe PID 828 wrote to memory of 3364 828 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe 0e6d87f5bd5e0fc8d8ecd6949623ef02.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e6d87f5bd5e0fc8d8ecd6949623ef02.exe"C:\Users\Admin\AppData\Local\Temp\0e6d87f5bd5e0fc8d8ecd6949623ef02.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\0e6d87f5bd5e0fc8d8ecd6949623ef02.exe"C:\Users\Admin\AppData\Local\Temp\0e6d87f5bd5e0fc8d8ecd6949623ef02.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/828-2-0x0000000073BB0000-0x000000007429E000-memory.dmpFilesize
6.9MB
-
memory/828-3-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/828-5-0x0000000005360000-0x0000000005361000-memory.dmpFilesize
4KB
-
memory/828-6-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/828-7-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/828-8-0x0000000005330000-0x0000000005331000-memory.dmpFilesize
4KB
-
memory/828-9-0x0000000005660000-0x0000000005661000-memory.dmpFilesize
4KB
-
memory/828-10-0x0000000005600000-0x0000000005612000-memory.dmpFilesize
72KB
-
memory/828-11-0x0000000006220000-0x000000000628E000-memory.dmpFilesize
440KB
-
memory/828-12-0x0000000006300000-0x0000000006301000-memory.dmpFilesize
4KB
-
memory/3364-13-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3364-14-0x000000000041EB70-mapping.dmp