Analysis
-
max time kernel
132s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:43
Static task
static1
Behavioral task
behavioral1
Sample
urgent specification request.exe
Resource
win7v20201028
General
-
Target
urgent specification request.exe
-
Size
1.0MB
-
MD5
72a9c8f82996953e9fa72e5e0b85afca
-
SHA1
33f74928d66e687c2f981f9219a92d936152cbaf
-
SHA256
931f6aeff35cea88af521bc2cdca24164113c47ab3153e148e33d5bce66313f4
-
SHA512
ed85947f1b9f04e1d84646386b635c05dce66f063b3095b9873adbfa5b6c14b7f4bcc385aa14c0a2da4efd772e9278a517f58ff6b31d7f654d325d2efd0fdddd
Malware Config
Extracted
formbook
http://www.timoniks.com/rbg/
fingermode.com
parkplace.finance
hollandgreen2020.com
starbets.site
vehiculesfrigorifiques.com
sydiifinancial.com
rpivuenation.com
freesubdirectory.com
independencepartynyc.com
dogruparti.info
independencecountyclub.com
midnightlashesbykim.com
digitalsept.com
whatilikeabouttoday.com
marktplaatsaccount.info
13400667334.com
xinwei-ge.com
login-appleid.info
momashands.com
kennyxpress.com
yushin2733.com
olenfex.com
agorabookstore.com
iotajinn.com
511tea.com
sullian.com
virtuallawyerservices.com
machineryhunters.online
mintamuntaz.com
sunflowerhybrid.com
hocbai24h.com
bundletvdeal.com
engjape.com
villamariaapartments.com
arabaozellikleri.net
fortheloveofdawg.com
mullinsmusicministry.com
rescuecellphones.com
infinityenterpriselr.com
humormug.com
summitplazagurgaon.com
rogo24.com
apluspartybus.com
chernliyfashion.com
presentvaluecore.com
bangbangfactory.com
leandroresolve.com
hk6628.com
anotherheadache.com
jiemanwu.com
a1dandyhandyman.com
pennsylvaniacraft.com
vrank.icu
avivemg.icu
littlestarenglish.com
jrprofessionale.com
belze.net
svtrbu.com
healthpassportasia.com
kadakudu.com
rahatindir.com
seamssewmuchbetter.com
brancusi.net
ido.lgbt
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2236-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2236-13-0x000000000041EB40-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
urgent specification request.exeurgent specification request.exedescription pid process target process PID 988 set thread context of 2236 988 urgent specification request.exe urgent specification request.exe PID 2236 set thread context of 2784 2236 urgent specification request.exe Explorer.EXE PID 2236 set thread context of 2784 2236 urgent specification request.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
urgent specification request.exepid process 2236 urgent specification request.exe 2236 urgent specification request.exe 2236 urgent specification request.exe 2236 urgent specification request.exe 2236 urgent specification request.exe 2236 urgent specification request.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
urgent specification request.exepid process 2236 urgent specification request.exe 2236 urgent specification request.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
urgent specification request.exedescription pid process Token: SeDebugPrivilege 2236 urgent specification request.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2784 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
urgent specification request.exedescription pid process target process PID 988 wrote to memory of 2236 988 urgent specification request.exe urgent specification request.exe PID 988 wrote to memory of 2236 988 urgent specification request.exe urgent specification request.exe PID 988 wrote to memory of 2236 988 urgent specification request.exe urgent specification request.exe PID 988 wrote to memory of 2236 988 urgent specification request.exe urgent specification request.exe PID 988 wrote to memory of 2236 988 urgent specification request.exe urgent specification request.exe PID 988 wrote to memory of 2236 988 urgent specification request.exe urgent specification request.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"C:\Users\Admin\AppData\Local\Temp\urgent specification request.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/988-2-0x0000000073800000-0x0000000073EEE000-memory.dmpFilesize
6.9MB
-
memory/988-3-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/988-5-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/988-6-0x00000000054F0000-0x00000000054F1000-memory.dmpFilesize
4KB
-
memory/988-7-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/988-8-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/988-9-0x00000000051C0000-0x00000000051C1000-memory.dmpFilesize
4KB
-
memory/988-10-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/988-11-0x0000000005D40000-0x0000000005DAB000-memory.dmpFilesize
428KB
-
memory/2236-12-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2236-13-0x000000000041EB40-mapping.dmp