Analysis
-
max time kernel
151s -
max time network
92s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 20:05
Static task
static1
Behavioral task
behavioral1
Sample
PO101420.exe
Resource
win7v20201028
General
-
Target
PO101420.exe
-
Size
837KB
-
MD5
ff9de567dd3c2aa2ebcb5e0450964875
-
SHA1
aeb352d5031fa9cd1f5a3e1a69c4c4740634956c
-
SHA256
709b457160612a42a7714a517690760f05b09fb55f61570632500aa14328deec
-
SHA512
b850406f9db839d5678997713034106c94c36d500f774ae222a086dcb9e693f450ba686f6ab13f6e9a07bf91e9aa92626a49e73a761d80c502c89f2ab3be279e
Malware Config
Extracted
formbook
http://www.hundsprobleme.com/fcxy/
3dimex.com
heartgem.net
jhfctzdsna.club
lurapures.com
musclegirlfix.com
zebragenetics.com
evyneellis.com
jiaxiaozx.com
kayanmag.com
ufomars.com
liverepaire.com
hitspluz.com
regulargirlhair.com
lafleurdulis.com
secretsseniorengineersknow.com
zoerichards.photos
alphaappraisal.net
southernrussia.com
jbskatingmuseum.com
lawxorder.art
savvykidworld.com
arjohuntleigh.sucks
topchoicemen.net
velvetmuonline.com
asen4d.com
chenqiao.site
wooowweb.com
islamicmoneypedia.com
vacadilloscarneseca.com
ultikrons.com
turanvipturizm.com
kegelbahnkeeper.net
les-crafteurs.com
theourworld.foundation
fortislifesciences.com
gforcestocks.com
bgfetgr.net
densichi-shop.website
careercanny.com
germluxclean.com
ubsumberbarokah.com
yqmagic.com
atelierbeaumur.site
rocketopinions.net
kardgo.com
jumben.xyz
zoomenglish.icu
shcrkx.com
imedicineq.online
cityloras.com
quraanpro.net
mudkingdom.com
scarvesandseas.com
pipsbp.net
materialarchives.press
weselltoday.com
suprimy.pro
buybrouhaha.com
ssxinwenw.com
ificanhelp.com
gabrielesv.com
denverdefensejobs.com
386215.com
californiaculinarywellness.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/304-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/304-8-0x000000000041ECE0-mapping.dmp formbook behavioral1/memory/968-9-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
PO101420.exeMSBuild.exeipconfig.exedescription pid process target process PID 1080 set thread context of 304 1080 PO101420.exe MSBuild.exe PID 304 set thread context of 1256 304 MSBuild.exe Explorer.EXE PID 304 set thread context of 1256 304 MSBuild.exe Explorer.EXE PID 968 set thread context of 1256 968 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 968 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
MSBuild.exeipconfig.exepid process 304 MSBuild.exe 304 MSBuild.exe 304 MSBuild.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe 968 ipconfig.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MSBuild.exeipconfig.exepid process 304 MSBuild.exe 304 MSBuild.exe 304 MSBuild.exe 304 MSBuild.exe 968 ipconfig.exe 968 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MSBuild.exeipconfig.exedescription pid process Token: SeDebugPrivilege 304 MSBuild.exe Token: SeDebugPrivilege 968 ipconfig.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PO101420.exeExplorer.EXEipconfig.exedescription pid process target process PID 1080 wrote to memory of 304 1080 PO101420.exe MSBuild.exe PID 1080 wrote to memory of 304 1080 PO101420.exe MSBuild.exe PID 1080 wrote to memory of 304 1080 PO101420.exe MSBuild.exe PID 1080 wrote to memory of 304 1080 PO101420.exe MSBuild.exe PID 1080 wrote to memory of 304 1080 PO101420.exe MSBuild.exe PID 1080 wrote to memory of 304 1080 PO101420.exe MSBuild.exe PID 1080 wrote to memory of 304 1080 PO101420.exe MSBuild.exe PID 1256 wrote to memory of 968 1256 Explorer.EXE ipconfig.exe PID 1256 wrote to memory of 968 1256 Explorer.EXE ipconfig.exe PID 1256 wrote to memory of 968 1256 Explorer.EXE ipconfig.exe PID 1256 wrote to memory of 968 1256 Explorer.EXE ipconfig.exe PID 968 wrote to memory of 268 968 ipconfig.exe cmd.exe PID 968 wrote to memory of 268 968 ipconfig.exe cmd.exe PID 968 wrote to memory of 268 968 ipconfig.exe cmd.exe PID 968 wrote to memory of 268 968 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO101420.exe"C:\Users\Admin\AppData\Local\Temp\PO101420.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-11-0x0000000000000000-mapping.dmp
-
memory/304-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/304-8-0x000000000041ECE0-mapping.dmp
-
memory/968-9-0x0000000000000000-mapping.dmp
-
memory/968-10-0x0000000000930000-0x000000000093A000-memory.dmpFilesize
40KB
-
memory/968-12-0x00000000030F0000-0x0000000003254000-memory.dmpFilesize
1.4MB
-
memory/1080-2-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB
-
memory/1080-3-0x0000000000D70000-0x0000000000D71000-memory.dmpFilesize
4KB
-
memory/1080-5-0x0000000000480000-0x000000000048E000-memory.dmpFilesize
56KB
-
memory/1080-6-0x00000000058C0000-0x000000000594D000-memory.dmpFilesize
564KB