Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:41
Static task
static1
Behavioral task
behavioral1
Sample
13012021.exe
Resource
win7v20201028
General
-
Target
13012021.exe
-
Size
1.0MB
-
MD5
5a3dfc0ef78aab90422df535e97cbe9c
-
SHA1
37a8d89122bd0555e3a83e4940ff1871892f55f6
-
SHA256
ae73e8799690e6e7efe2222fe8a471af2c7f7f0f82dff259434626eac35a2721
-
SHA512
63713d49cb4c3d1cadf05be96bfb6c1e9152b999a99ce9567c634d382e45885ade8acc0aaae3771a4396038337e1f31d2d3a50214bebc452e2e21f9010540c9e
Malware Config
Extracted
formbook
http://www.timoniks.com/rbg/
fingermode.com
parkplace.finance
hollandgreen2020.com
starbets.site
vehiculesfrigorifiques.com
sydiifinancial.com
rpivuenation.com
freesubdirectory.com
independencepartynyc.com
dogruparti.info
independencecountyclub.com
midnightlashesbykim.com
digitalsept.com
whatilikeabouttoday.com
marktplaatsaccount.info
13400667334.com
xinwei-ge.com
login-appleid.info
momashands.com
kennyxpress.com
yushin2733.com
olenfex.com
agorabookstore.com
iotajinn.com
511tea.com
sullian.com
virtuallawyerservices.com
machineryhunters.online
mintamuntaz.com
sunflowerhybrid.com
hocbai24h.com
bundletvdeal.com
engjape.com
villamariaapartments.com
arabaozellikleri.net
fortheloveofdawg.com
mullinsmusicministry.com
rescuecellphones.com
infinityenterpriselr.com
humormug.com
summitplazagurgaon.com
rogo24.com
apluspartybus.com
chernliyfashion.com
presentvaluecore.com
bangbangfactory.com
leandroresolve.com
hk6628.com
anotherheadache.com
jiemanwu.com
a1dandyhandyman.com
pennsylvaniacraft.com
vrank.icu
avivemg.icu
littlestarenglish.com
jrprofessionale.com
belze.net
svtrbu.com
healthpassportasia.com
kadakudu.com
rahatindir.com
seamssewmuchbetter.com
brancusi.net
ido.lgbt
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2964-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2964-13-0x000000000041EB40-mapping.dmp formbook behavioral2/memory/3492-14-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
13012021.exe13012021.exerundll32.exedescription pid process target process PID 1192 set thread context of 2964 1192 13012021.exe 13012021.exe PID 2964 set thread context of 2984 2964 13012021.exe Explorer.EXE PID 3492 set thread context of 2984 3492 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
13012021.exe13012021.exerundll32.exepid process 1192 13012021.exe 1192 13012021.exe 1192 13012021.exe 1192 13012021.exe 2964 13012021.exe 2964 13012021.exe 2964 13012021.exe 2964 13012021.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
13012021.exerundll32.exepid process 2964 13012021.exe 2964 13012021.exe 2964 13012021.exe 3492 rundll32.exe 3492 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
13012021.exe13012021.exerundll32.exedescription pid process Token: SeDebugPrivilege 1192 13012021.exe Token: SeDebugPrivilege 2964 13012021.exe Token: SeDebugPrivilege 3492 rundll32.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2984 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
13012021.exeExplorer.EXErundll32.exedescription pid process target process PID 1192 wrote to memory of 2796 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2796 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2796 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 864 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 864 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 864 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2964 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2964 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2964 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2964 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2964 1192 13012021.exe 13012021.exe PID 1192 wrote to memory of 2964 1192 13012021.exe 13012021.exe PID 2984 wrote to memory of 3492 2984 Explorer.EXE rundll32.exe PID 2984 wrote to memory of 3492 2984 Explorer.EXE rundll32.exe PID 2984 wrote to memory of 3492 2984 Explorer.EXE rundll32.exe PID 3492 wrote to memory of 3420 3492 rundll32.exe cmd.exe PID 3492 wrote to memory of 3420 3492 rundll32.exe cmd.exe PID 3492 wrote to memory of 3420 3492 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\13012021.exe"C:\Users\Admin\AppData\Local\Temp\13012021.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\13012021.exe"C:\Users\Admin\AppData\Local\Temp\13012021.exe"3⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\13012021.exe"C:\Users\Admin\AppData\Local\Temp\13012021.exe"3⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\13012021.exe"C:\Users\Admin\AppData\Local\Temp\13012021.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\13012021.exe"3⤵PID:3420
-
-