Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:43
Static task
static1
Behavioral task
behavioral1
Sample
20210113155320.exe
Resource
win7v20201028
General
-
Target
20210113155320.exe
-
Size
1.0MB
-
MD5
0f44dd4d1edea35e84e0d2495ac90b5b
-
SHA1
656e86e7556720bb16c0b8d760b87b0520ed8f20
-
SHA256
38dac51ef91ec8f45bdb2749e2eec758b07e7b9855f2b9b25d2e59783ba9ff41
-
SHA512
c8aef460935dd1cd8413648be5a7ed7ddffd9204a5bb38c558816274ccd350d9ab892e5c3884bf75bacb9036cb46ebe2108c86d1e2c66cab39d807defc541e5f
Malware Config
Extracted
formbook
http://www.southsideflooringcreations.com/dkk/
goldenfarmm.com
miproper.com
theutahan.com
efeteenerji.com
wellfarehealth.com
setricoo.com
enjoyablephotobooths.com
semaindustrial.com
jennywet.com
jackhughesart.com
cantgetryte.com
searko.com
zxrxhuny.icu
exoticorganicwine.com
fordexplorerproblems.com
locationwebtv.net
elinvoimainenperhe.com
mundoclik.com
nouvellenormale.com
talasnakliyat.com
mundusabsurdus.com
leathercustomgrips.com
5523.xyz
aaabizmedia.com
sandrasantoss.com
sellitech.net
pangeleia.com
risepasal.com
ruidev.site
blogthatanswer.com
cormacknnl.com
coolfishartist.com
jessicaasiankitchen.com
hinikerco.com
dragonflyaerialimagery.net
dhtmlkits.com
miacella.com
mvipfb.com
108-bet.com
lancru-baikyaku.xyz
hkgerry.com
solarpanelsgreenenergy.com
traditionalcookingacademy.com
freecarandhome.com
naturacake.com
dreambuildarchitect.com
ortigiarealty.com
datings.life
willtecint.com
newlife-here.com
850712.com
fallguysskin.com
portaldoctortv.com
nocodehosting.com
ornhealthcare.com
amkuyidl.icu
trinewstyles.com
rabninco.com
trapusaapparel.com
mystiquerubirosarum.com
xn--mundocao-j3a.com
226basketball.com
goodj.online
congratulationsbanner.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2096-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2096-15-0x000000000041EC00-mapping.dmp formbook behavioral2/memory/1408-17-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
20210113155320.exe20210113155320.execscript.exedescription pid process target process PID 4092 set thread context of 2096 4092 20210113155320.exe 20210113155320.exe PID 2096 set thread context of 2756 2096 20210113155320.exe Explorer.EXE PID 2096 set thread context of 2756 2096 20210113155320.exe Explorer.EXE PID 1408 set thread context of 2756 1408 cscript.exe Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
20210113155320.exe20210113155320.execscript.exepid process 4092 20210113155320.exe 2096 20210113155320.exe 2096 20210113155320.exe 2096 20210113155320.exe 2096 20210113155320.exe 2096 20210113155320.exe 2096 20210113155320.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe 1408 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
20210113155320.execscript.exepid process 2096 20210113155320.exe 2096 20210113155320.exe 2096 20210113155320.exe 2096 20210113155320.exe 1408 cscript.exe 1408 cscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
20210113155320.exe20210113155320.execscript.exedescription pid process Token: SeDebugPrivilege 4092 20210113155320.exe Token: SeDebugPrivilege 2096 20210113155320.exe Token: SeDebugPrivilege 1408 cscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2756 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
20210113155320.exe20210113155320.execscript.exedescription pid process target process PID 4092 wrote to memory of 1096 4092 20210113155320.exe schtasks.exe PID 4092 wrote to memory of 1096 4092 20210113155320.exe schtasks.exe PID 4092 wrote to memory of 1096 4092 20210113155320.exe schtasks.exe PID 4092 wrote to memory of 2096 4092 20210113155320.exe 20210113155320.exe PID 4092 wrote to memory of 2096 4092 20210113155320.exe 20210113155320.exe PID 4092 wrote to memory of 2096 4092 20210113155320.exe 20210113155320.exe PID 4092 wrote to memory of 2096 4092 20210113155320.exe 20210113155320.exe PID 4092 wrote to memory of 2096 4092 20210113155320.exe 20210113155320.exe PID 4092 wrote to memory of 2096 4092 20210113155320.exe 20210113155320.exe PID 2096 wrote to memory of 1408 2096 20210113155320.exe cscript.exe PID 2096 wrote to memory of 1408 2096 20210113155320.exe cscript.exe PID 2096 wrote to memory of 1408 2096 20210113155320.exe cscript.exe PID 1408 wrote to memory of 3892 1408 cscript.exe cmd.exe PID 1408 wrote to memory of 3892 1408 cscript.exe cmd.exe PID 1408 wrote to memory of 3892 1408 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Temp\20210113155320.exe"C:\Users\Admin\AppData\Local\Temp\20210113155320.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OKKTFu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1202.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\20210113155320.exe"C:\Users\Admin\AppData\Local\Temp\20210113155320.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\20210113155320.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1202.tmpMD5
7b55548ff2066cfbf7e8d2bcc575e227
SHA112633d199a9b0be58e524362b727b793efd0edb4
SHA2562bdd2c124b4fffb478190ba182d7a121c58ea782300569a7512d43649d68f2ba
SHA5124b423c93ae064ae521f023113888643a80e58528f67c283cc33b2d82bfbd46624c4a314d49e7640e4fc6d9d831d7859c0830a5028a62e5e2170c331390c46388
-
memory/1096-12-0x0000000000000000-mapping.dmp
-
memory/1408-21-0x0000000005DD0000-0x0000000005F45000-memory.dmpFilesize
1.5MB
-
memory/1408-19-0x0000000000D90000-0x0000000000DB7000-memory.dmpFilesize
156KB
-
memory/1408-18-0x0000000000D90000-0x0000000000DB7000-memory.dmpFilesize
156KB
-
memory/1408-17-0x0000000000000000-mapping.dmp
-
memory/2096-15-0x000000000041EC00-mapping.dmp
-
memory/2096-14-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2756-22-0x0000000002BF0000-0x0000000002CD8000-memory.dmpFilesize
928KB
-
memory/3892-20-0x0000000000000000-mapping.dmp
-
memory/4092-7-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/4092-11-0x0000000005AE0000-0x0000000005B4B000-memory.dmpFilesize
428KB
-
memory/4092-10-0x0000000004D80000-0x0000000004D92000-memory.dmpFilesize
72KB
-
memory/4092-9-0x0000000004F30000-0x0000000004F31000-memory.dmpFilesize
4KB
-
memory/4092-8-0x0000000004C30000-0x0000000004C31000-memory.dmpFilesize
4KB
-
memory/4092-2-0x00000000739A0000-0x000000007408E000-memory.dmpFilesize
6.9MB
-
memory/4092-6-0x00000000052B0000-0x00000000052B1000-memory.dmpFilesize
4KB
-
memory/4092-5-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/4092-3-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB