Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 10:41
Static task
static1
Behavioral task
behavioral1
Sample
b.exe
Resource
win7v20201028
General
-
Target
b.exe
-
Size
3.3MB
-
MD5
30cb872994e8a0a4a635b06bfbe38006
-
SHA1
02e502ef79ea251f04fa9e02dd1d7639e59c7ddc
-
SHA256
d0b62e121a89ba8e44b4b71a887dd80df1e4fc746dabc200854622e9ed1fa8cb
-
SHA512
57bc48f7c2e77d28f13cd52dadeaa24a50a8eafb0316c2b7894e49cbe17fb16f14efe4f7b7568ef3ae40c7e6ec0a07862ec9bd91541be477795f7c113a4816d1
Malware Config
Extracted
formbook
http://www.registeredagentfirm.com/jqc/
strahlenschutz.digital
soterppe.com
wlw-hnlt.com
topheadlinetowitness-today.info
droriginals.com
baculatechie.online
definity.finance
weddingmustgoon.com
ludisenofloral.com
kenniscourtureconsignments.com
dl888.net
singledynamics.com
internetmarkaching.com
solidconstruct.site
ip-freight.com
11sxsx.com
incomecontent.com
the343radio.com
kimberlygoedhart.net
dgdoughnuts.net
vivethk.com
st-reet.com
luxusgrotte.com
hareland.info
fitdramas.com
shakahats.com
cositasdepachecos.com
lhc965.com
5hnjy.com
zoommedicaremeetings.com
bebywye.site
ravenlewis.com
avia-sales.xyz
screwtaped.com
xaustock.com
hongreng.xyz
lokalised.com
neosolutionsllc.com
ecandkllc.com
sistertravelalliance.com
brotherhoodoffathers.com
mybestme.store
vigilantdis.com
sqatzx.com
kornteengoods.com
miamiwaterworld.com
mywillandmylife.com
novergi.com
eaglesnestpropheticministry.com
sterlworldshop.com
gabriellagullberg.com
toweroflifeinc.com
tiendazoom.com
dividupe.com
szyulics.com
theorangepearl.com
hotvidzhub.download
asacal.com
systemedalarmebe.com
margosbest.com
kathymusic.com
quintred.com
mad54.art
simplification.business
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/968-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/968-11-0x000000000041EB50-mapping.dmp formbook behavioral1/memory/560-13-0x0000000000000000-mapping.dmp formbook -
Executes dropped EXE 1 IoCs
Processes:
AddInProcess32.exepid process 968 AddInProcess32.exe -
Loads dropped DLL 1 IoCs
Processes:
b.exepid process 1068 b.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b.exeAddInProcess32.execolorcpl.exedescription pid process target process PID 1068 set thread context of 968 1068 b.exe AddInProcess32.exe PID 968 set thread context of 1236 968 AddInProcess32.exe Explorer.EXE PID 560 set thread context of 1236 560 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
b.exeAddInProcess32.execolorcpl.exepid process 1068 b.exe 1068 b.exe 968 AddInProcess32.exe 968 AddInProcess32.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe 560 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
AddInProcess32.execolorcpl.exepid process 968 AddInProcess32.exe 968 AddInProcess32.exe 968 AddInProcess32.exe 560 colorcpl.exe 560 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b.exeAddInProcess32.execolorcpl.exedescription pid process Token: SeDebugPrivilege 1068 b.exe Token: SeDebugPrivilege 968 AddInProcess32.exe Token: SeDebugPrivilege 560 colorcpl.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
b.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 1068 wrote to memory of 968 1068 b.exe AddInProcess32.exe PID 1068 wrote to memory of 968 1068 b.exe AddInProcess32.exe PID 1068 wrote to memory of 968 1068 b.exe AddInProcess32.exe PID 1068 wrote to memory of 968 1068 b.exe AddInProcess32.exe PID 1068 wrote to memory of 968 1068 b.exe AddInProcess32.exe PID 1068 wrote to memory of 968 1068 b.exe AddInProcess32.exe PID 1068 wrote to memory of 968 1068 b.exe AddInProcess32.exe PID 1236 wrote to memory of 560 1236 Explorer.EXE colorcpl.exe PID 1236 wrote to memory of 560 1236 Explorer.EXE colorcpl.exe PID 1236 wrote to memory of 560 1236 Explorer.EXE colorcpl.exe PID 1236 wrote to memory of 560 1236 Explorer.EXE colorcpl.exe PID 560 wrote to memory of 1632 560 colorcpl.exe cmd.exe PID 560 wrote to memory of 1632 560 colorcpl.exe cmd.exe PID 560 wrote to memory of 1632 560 colorcpl.exe cmd.exe PID 560 wrote to memory of 1632 560 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\b.exe"C:\Users\Admin\AppData\Local\Temp\b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵PID:1632
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39