Analysis
-
max time kernel
147s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-01-2021 07:23
Static task
static1
Behavioral task
behavioral1
Sample
M.V. CHIANG TUN_pdf.exe
Resource
win7v20201028
General
-
Target
M.V. CHIANG TUN_pdf.exe
-
Size
852KB
-
MD5
e16fc6dd80b2adb86bfdcd9f4fe6a787
-
SHA1
ccc534305f283b657c7ac9ddcbdbc321da08f95f
-
SHA256
f8a388fc032aa7fdf80ed5bad850e3429ee27614bd6152efaa090fc77ad3bc6a
-
SHA512
f913c2810853d0a76c9661f5ed51673a1c1602c8f6b1cfc4c06d9e0c4cc7a002efd6bd2c0189fe4ead15f1cc42181059bbc8cafabc08c7c6817b56e6ab26081e
Malware Config
Extracted
formbook
http://www.huynhanhdung.com/kna/
lawrencefiredepartment.com
executivehomeoffices.com
solfed.world
oshawaexchange.com
webdavlexstore.com
youpieb.com
chiller-master.com
bearstoragetn.com
daf90x16.com
gewhacaalouine.com
simplyezi.com
cstechnologyservices.com
nosyboats.com
thecocomarie.com
vetinaryeco.club
americangoselfilm.com
gdsuhejia.com
verbunden-sein.net
the-minerva.com
loctrantv.com
casualluvonline.com
groups3usa.com
ncdcnow.com
qrastenmap.online
ltjxw.net
crystalblueboating.com
51adcn.com
abrasto.com
smokegas.com
schofieldoutpost.com
sh-ruidiclub.com
zzyxgl.com
qpremodeling.com
ayzvyeco.icu
modestartgallery.com
ref478.com
astutetopshop.com
pinebarrenfarms.com
webprofiji.com
purfect-air.com
transformesuasaude.com
oz-men.com
mpjjpwp.icu
zeinabiohouse.com
shopwaterlemon.com
radiohebron.com
americanheraldnews.com
clinicadentalfika.com
throughthelorgnette.com
carte-diem.com
elderstatesmanarchive.com
nanhulove.com
melonicwater.com
streamingdads.com
indrapandhari.com
dc-prices.com
xstarconnect.com
weninse.com
atlantavirtualmeetings.com
jobhelpseekers.com
freisaq.com
viajeaatenas.com
worldparcel.net
qcc3.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1512-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1512-8-0x000000000041EAB0-mapping.dmp formbook behavioral1/memory/472-9-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 332 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
M.V. CHIANG TUN_pdf.exeM.V. CHIANG TUN_pdf.exenetsh.exedescription pid process target process PID 848 set thread context of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 1512 set thread context of 1244 1512 M.V. CHIANG TUN_pdf.exe Explorer.EXE PID 472 set thread context of 1244 472 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
M.V. CHIANG TUN_pdf.exenetsh.exepid process 1512 M.V. CHIANG TUN_pdf.exe 1512 M.V. CHIANG TUN_pdf.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe 472 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
M.V. CHIANG TUN_pdf.exenetsh.exepid process 1512 M.V. CHIANG TUN_pdf.exe 1512 M.V. CHIANG TUN_pdf.exe 1512 M.V. CHIANG TUN_pdf.exe 472 netsh.exe 472 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
M.V. CHIANG TUN_pdf.exenetsh.exedescription pid process Token: SeDebugPrivilege 1512 M.V. CHIANG TUN_pdf.exe Token: SeDebugPrivilege 472 netsh.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
M.V. CHIANG TUN_pdf.exeExplorer.EXEnetsh.exedescription pid process target process PID 848 wrote to memory of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 848 wrote to memory of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 848 wrote to memory of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 848 wrote to memory of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 848 wrote to memory of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 848 wrote to memory of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 848 wrote to memory of 1512 848 M.V. CHIANG TUN_pdf.exe M.V. CHIANG TUN_pdf.exe PID 1244 wrote to memory of 472 1244 Explorer.EXE netsh.exe PID 1244 wrote to memory of 472 1244 Explorer.EXE netsh.exe PID 1244 wrote to memory of 472 1244 Explorer.EXE netsh.exe PID 1244 wrote to memory of 472 1244 Explorer.EXE netsh.exe PID 472 wrote to memory of 332 472 netsh.exe cmd.exe PID 472 wrote to memory of 332 472 netsh.exe cmd.exe PID 472 wrote to memory of 332 472 netsh.exe cmd.exe PID 472 wrote to memory of 332 472 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\M.V. CHIANG TUN_pdf.exe"C:\Users\Admin\AppData\Local\Temp\M.V. CHIANG TUN_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\M.V. CHIANG TUN_pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1680
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\M.V. CHIANG TUN_pdf.exe"3⤵
- Deletes itself
PID:332