Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 07:24
Static task
static1
Behavioral task
behavioral1
Sample
payment advice00000789_pdf.exe
Resource
win7v20201028
General
-
Target
payment advice00000789_pdf.exe
-
Size
866KB
-
MD5
a08fc6065952b6625893e48a8bc72106
-
SHA1
7b4baec718caa9c5a3aa7cbe1d85121af68f810b
-
SHA256
c3d490568e73f61c86d2d4c01e170bdcf3c0d3eb5e309ff3d3fb808a4a867a54
-
SHA512
2edcf7922cdd41d2b30ef3abb734a79a21ace178f8ea100067077be7ff5aca470e2000f869b839aca27b86ea4da9bdefcbc408de19e4e461a082fe5c7c916974
Malware Config
Extracted
formbook
http://www.aftabzahur.com/wgn/
kokokara-life-blog.com
faswear.com
futureleadershiptoday.com
date4done.xyz
thecouponinn.com
bbeycarpetsf.com
propolisnasalspray.com
jinjudiamond.com
goodevectors.com
nehyam.com
evalinkapuppets.com
what-if-statistics.com
rateofrisk.com
impacttestonlinne.com
servis-kaydet.info
coloniacafe.com
marcemarketing.com
aarigging.com
goddesswitchery.com
jasqblo.icu
ballotlocations.com
opulentredesign.com
nicolakwan.com
timcarecskh.online
albertaeatsfood.com
impactnwf.com
transportersolutions.com
jkfdjkdjkfjkddre.com
haslvapps.com
oakhazelnut.com
jazzyfans.net
uklcp.com
genericfreeemailservice.com
jettbay.com
utahcommunitynewsnetwork.com
vinos-online.com
lafatime.com
2438kingsland.com
groovepags.com
locationwhiz.com
edu1center.com
chronic-trauma.com
ytr.xyz
airconacademy-courses.com
gawafeqauibne.com
flowcedure.com
bwproskill.com
woodenbros.com
thesearsgroupnc.com
whoaminot.com
addvations.com
fatboidonuts.com
mobileworkforcevpn.net
offto.site
tehospedamos.com
nadinerae.com
betherightcandidate.com
ethosgov.com
cgbaran.com
xynewadmrykaa.com
socialdistancing.cool
kedalamsapi.com
hendifishing.online
geniusprosolutions.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4088-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4088-12-0x000000000041EAC0-mapping.dmp formbook behavioral2/memory/4368-14-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
payment advice00000789_pdf.exepayment advice00000789_pdf.execmd.exedescription pid process target process PID 4708 set thread context of 4088 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4088 set thread context of 2852 4088 payment advice00000789_pdf.exe Explorer.EXE PID 4368 set thread context of 2852 4368 cmd.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
payment advice00000789_pdf.exepayment advice00000789_pdf.execmd.exepid process 4708 payment advice00000789_pdf.exe 4708 payment advice00000789_pdf.exe 4088 payment advice00000789_pdf.exe 4088 payment advice00000789_pdf.exe 4088 payment advice00000789_pdf.exe 4088 payment advice00000789_pdf.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe 4368 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
payment advice00000789_pdf.execmd.exepid process 4088 payment advice00000789_pdf.exe 4088 payment advice00000789_pdf.exe 4088 payment advice00000789_pdf.exe 4368 cmd.exe 4368 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
payment advice00000789_pdf.exepayment advice00000789_pdf.execmd.exedescription pid process Token: SeDebugPrivilege 4708 payment advice00000789_pdf.exe Token: SeDebugPrivilege 4088 payment advice00000789_pdf.exe Token: SeDebugPrivilege 4368 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2852 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
payment advice00000789_pdf.exeExplorer.EXEcmd.exedescription pid process target process PID 4708 wrote to memory of 3240 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 3240 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 3240 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 4088 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 4088 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 4088 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 4088 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 4088 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 4708 wrote to memory of 4088 4708 payment advice00000789_pdf.exe payment advice00000789_pdf.exe PID 2852 wrote to memory of 4368 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 4368 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 4368 2852 Explorer.EXE cmd.exe PID 4368 wrote to memory of 4076 4368 cmd.exe cmd.exe PID 4368 wrote to memory of 4076 4368 cmd.exe cmd.exe PID 4368 wrote to memory of 4076 4368 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\payment advice00000789_pdf.exe"C:\Users\Admin\AppData\Local\Temp\payment advice00000789_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\payment advice00000789_pdf.exe"{path}"3⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\payment advice00000789_pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\payment advice00000789_pdf.exe"3⤵PID:4076