Analysis
-
max time kernel
151s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 20:20
Static task
static1
Behavioral task
behavioral1
Sample
20210113432.exe
Resource
win7v20201028
General
-
Target
20210113432.exe
-
Size
1.0MB
-
MD5
13dbc9c1c5a2811ecbee5f420c9c75b6
-
SHA1
6b01e540d3757944b61baa187159a908e170d5ae
-
SHA256
ba41656ca5e0e243cff9f6a536c43998a9dbc492f5e813a0022e84359b2e0ef8
-
SHA512
ae1414b91ba91a29575901ac0daf55aa937454b1afcd53d7d0c9461ca2b48d65bb1f3213ad23853987a40381a2f57be359fdbf7848ff57432b5e95ffd4cbcea1
Malware Config
Extracted
formbook
http://www.southsideflooringcreations.com/dkk/
goldenfarmm.com
miproper.com
theutahan.com
efeteenerji.com
wellfarehealth.com
setricoo.com
enjoyablephotobooths.com
semaindustrial.com
jennywet.com
jackhughesart.com
cantgetryte.com
searko.com
zxrxhuny.icu
exoticorganicwine.com
fordexplorerproblems.com
locationwebtv.net
elinvoimainenperhe.com
mundoclik.com
nouvellenormale.com
talasnakliyat.com
mundusabsurdus.com
leathercustomgrips.com
5523.xyz
aaabizmedia.com
sandrasantoss.com
sellitech.net
pangeleia.com
risepasal.com
ruidev.site
blogthatanswer.com
cormacknnl.com
coolfishartist.com
jessicaasiankitchen.com
hinikerco.com
dragonflyaerialimagery.net
dhtmlkits.com
miacella.com
mvipfb.com
108-bet.com
lancru-baikyaku.xyz
hkgerry.com
solarpanelsgreenenergy.com
traditionalcookingacademy.com
freecarandhome.com
naturacake.com
dreambuildarchitect.com
ortigiarealty.com
datings.life
willtecint.com
newlife-here.com
850712.com
fallguysskin.com
portaldoctortv.com
nocodehosting.com
ornhealthcare.com
amkuyidl.icu
trinewstyles.com
rabninco.com
trapusaapparel.com
mystiquerubirosarum.com
xn--mundocao-j3a.com
226basketball.com
goodj.online
congratulationsbanner.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1528-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1528-8-0x000000000041EC00-mapping.dmp formbook behavioral1/memory/652-9-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 728 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
20210113432.exe20210113432.exerundll32.exedescription pid process target process PID 644 set thread context of 1528 644 20210113432.exe 20210113432.exe PID 1528 set thread context of 1200 1528 20210113432.exe Explorer.EXE PID 652 set thread context of 1200 652 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
20210113432.exerundll32.exepid process 1528 20210113432.exe 1528 20210113432.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe 652 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
20210113432.exerundll32.exepid process 1528 20210113432.exe 1528 20210113432.exe 1528 20210113432.exe 652 rundll32.exe 652 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20210113432.exerundll32.exedescription pid process Token: SeDebugPrivilege 1528 20210113432.exe Token: SeDebugPrivilege 652 rundll32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
20210113432.exeExplorer.EXErundll32.exedescription pid process target process PID 644 wrote to memory of 1528 644 20210113432.exe 20210113432.exe PID 644 wrote to memory of 1528 644 20210113432.exe 20210113432.exe PID 644 wrote to memory of 1528 644 20210113432.exe 20210113432.exe PID 644 wrote to memory of 1528 644 20210113432.exe 20210113432.exe PID 644 wrote to memory of 1528 644 20210113432.exe 20210113432.exe PID 644 wrote to memory of 1528 644 20210113432.exe 20210113432.exe PID 644 wrote to memory of 1528 644 20210113432.exe 20210113432.exe PID 1200 wrote to memory of 652 1200 Explorer.EXE rundll32.exe PID 1200 wrote to memory of 652 1200 Explorer.EXE rundll32.exe PID 1200 wrote to memory of 652 1200 Explorer.EXE rundll32.exe PID 1200 wrote to memory of 652 1200 Explorer.EXE rundll32.exe PID 1200 wrote to memory of 652 1200 Explorer.EXE rundll32.exe PID 1200 wrote to memory of 652 1200 Explorer.EXE rundll32.exe PID 1200 wrote to memory of 652 1200 Explorer.EXE rundll32.exe PID 652 wrote to memory of 728 652 rundll32.exe cmd.exe PID 652 wrote to memory of 728 652 rundll32.exe cmd.exe PID 652 wrote to memory of 728 652 rundll32.exe cmd.exe PID 652 wrote to memory of 728 652 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\20210113432.exe"C:\Users\Admin\AppData\Local\Temp\20210113432.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\20210113432.exe"C:\Users\Admin\AppData\Local\Temp\20210113432.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\20210113432.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/644-2-0x0000000074390000-0x0000000074A7E000-memory.dmpFilesize
6.9MB
-
memory/644-3-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/644-5-0x00000000004F0000-0x0000000000502000-memory.dmpFilesize
72KB
-
memory/644-6-0x0000000004CD0000-0x0000000004D3A000-memory.dmpFilesize
424KB
-
memory/652-9-0x0000000000000000-mapping.dmp
-
memory/652-10-0x0000000000050000-0x000000000005E000-memory.dmpFilesize
56KB
-
memory/652-12-0x0000000003130000-0x00000000031F2000-memory.dmpFilesize
776KB
-
memory/728-11-0x0000000000000000-mapping.dmp
-
memory/1528-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1528-8-0x000000000041EC00-mapping.dmp