Analysis
-
max time kernel
150s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 07:43
Static task
static1
Behavioral task
behavioral1
Sample
urgent specification request.exe
Resource
win7v20201028
General
-
Target
urgent specification request.exe
-
Size
1.0MB
-
MD5
72a9c8f82996953e9fa72e5e0b85afca
-
SHA1
33f74928d66e687c2f981f9219a92d936152cbaf
-
SHA256
931f6aeff35cea88af521bc2cdca24164113c47ab3153e148e33d5bce66313f4
-
SHA512
ed85947f1b9f04e1d84646386b635c05dce66f063b3095b9873adbfa5b6c14b7f4bcc385aa14c0a2da4efd772e9278a517f58ff6b31d7f654d325d2efd0fdddd
Malware Config
Extracted
formbook
http://www.timoniks.com/rbg/
fingermode.com
parkplace.finance
hollandgreen2020.com
starbets.site
vehiculesfrigorifiques.com
sydiifinancial.com
rpivuenation.com
freesubdirectory.com
independencepartynyc.com
dogruparti.info
independencecountyclub.com
midnightlashesbykim.com
digitalsept.com
whatilikeabouttoday.com
marktplaatsaccount.info
13400667334.com
xinwei-ge.com
login-appleid.info
momashands.com
kennyxpress.com
yushin2733.com
olenfex.com
agorabookstore.com
iotajinn.com
511tea.com
sullian.com
virtuallawyerservices.com
machineryhunters.online
mintamuntaz.com
sunflowerhybrid.com
hocbai24h.com
bundletvdeal.com
engjape.com
villamariaapartments.com
arabaozellikleri.net
fortheloveofdawg.com
mullinsmusicministry.com
rescuecellphones.com
infinityenterpriselr.com
humormug.com
summitplazagurgaon.com
rogo24.com
apluspartybus.com
chernliyfashion.com
presentvaluecore.com
bangbangfactory.com
leandroresolve.com
hk6628.com
anotherheadache.com
jiemanwu.com
a1dandyhandyman.com
pennsylvaniacraft.com
vrank.icu
avivemg.icu
littlestarenglish.com
jrprofessionale.com
belze.net
svtrbu.com
healthpassportasia.com
kadakudu.com
rahatindir.com
seamssewmuchbetter.com
brancusi.net
ido.lgbt
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/108-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/108-8-0x000000000041EB40-mapping.dmp formbook behavioral1/memory/1504-10-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 304 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
urgent specification request.exeurgent specification request.exewininit.exedescription pid process target process PID 1848 set thread context of 108 1848 urgent specification request.exe urgent specification request.exe PID 108 set thread context of 1192 108 urgent specification request.exe Explorer.EXE PID 108 set thread context of 1192 108 urgent specification request.exe Explorer.EXE PID 1504 set thread context of 1192 1504 wininit.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
urgent specification request.exewininit.exepid process 108 urgent specification request.exe 108 urgent specification request.exe 108 urgent specification request.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe 1504 wininit.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
urgent specification request.exewininit.exepid process 108 urgent specification request.exe 108 urgent specification request.exe 108 urgent specification request.exe 108 urgent specification request.exe 1504 wininit.exe 1504 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
urgent specification request.exewininit.exedescription pid process Token: SeDebugPrivilege 108 urgent specification request.exe Token: SeDebugPrivilege 1504 wininit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
urgent specification request.exeurgent specification request.exewininit.exedescription pid process target process PID 1848 wrote to memory of 108 1848 urgent specification request.exe urgent specification request.exe PID 1848 wrote to memory of 108 1848 urgent specification request.exe urgent specification request.exe PID 1848 wrote to memory of 108 1848 urgent specification request.exe urgent specification request.exe PID 1848 wrote to memory of 108 1848 urgent specification request.exe urgent specification request.exe PID 1848 wrote to memory of 108 1848 urgent specification request.exe urgent specification request.exe PID 1848 wrote to memory of 108 1848 urgent specification request.exe urgent specification request.exe PID 1848 wrote to memory of 108 1848 urgent specification request.exe urgent specification request.exe PID 108 wrote to memory of 1504 108 urgent specification request.exe wininit.exe PID 108 wrote to memory of 1504 108 urgent specification request.exe wininit.exe PID 108 wrote to memory of 1504 108 urgent specification request.exe wininit.exe PID 108 wrote to memory of 1504 108 urgent specification request.exe wininit.exe PID 1504 wrote to memory of 304 1504 wininit.exe cmd.exe PID 1504 wrote to memory of 304 1504 wininit.exe cmd.exe PID 1504 wrote to memory of 304 1504 wininit.exe cmd.exe PID 1504 wrote to memory of 304 1504 wininit.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"5⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/108-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/108-8-0x000000000041EB40-mapping.dmp
-
memory/304-12-0x0000000000000000-mapping.dmp
-
memory/1192-9-0x0000000007030000-0x00000000071D7000-memory.dmpFilesize
1.7MB
-
memory/1192-14-0x0000000007820000-0x0000000007976000-memory.dmpFilesize
1.3MB
-
memory/1504-10-0x0000000000000000-mapping.dmp
-
memory/1504-11-0x0000000000790000-0x00000000007AA000-memory.dmpFilesize
104KB
-
memory/1504-13-0x0000000002FB0000-0x000000000304E000-memory.dmpFilesize
632KB
-
memory/1848-2-0x0000000074590000-0x0000000074C7E000-memory.dmpFilesize
6.9MB
-
memory/1848-3-0x0000000000B90000-0x0000000000B91000-memory.dmpFilesize
4KB
-
memory/1848-5-0x0000000000290000-0x00000000002A2000-memory.dmpFilesize
72KB
-
memory/1848-6-0x00000000054A0000-0x000000000550B000-memory.dmpFilesize
428KB