Analysis
-
max time kernel
147s -
max time network
21s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 15:54
Static task
static1
Behavioral task
behavioral1
Sample
Paid Invoices_pdf.exe
Resource
win7v20201028
General
-
Target
Paid Invoices_pdf.exe
-
Size
738KB
-
MD5
0326b2ad0ec402ad9421d6dbb1d4b93e
-
SHA1
f52d2a7b483499334ce084671b874ee3ad921511
-
SHA256
7a0468a1843e1d6b3e6ad5bdb9f3e1ad2131349fbaf0ac9737f212bca59ce783
-
SHA512
fee6512b00c39a93f5aeb88d9fa6ccd96c2d8bdf6d1bfb53924e5dc002e2b450dd9028dcd9633ae0aa58bab036834d70ae74f1913009e8e092fe0ef02474a159
Malware Config
Extracted
formbook
http://www.transparentpetcrate.com/lnb/
sauschwein.info
ywpntv.com
gironbeautysalon.online
cryptogeekstuff.com
leosrock.com
sistersv.space
ilss.life
vshuzi.com
europeanculinarymagic.com
mdtlalab.com
boletasenorden.com
eebushe11.com
sms8888.com
arrogantjerxs.com
aboudmotors.com
vzuels.com
searko.com
thathealthysoul.com
365wt38493984284.com
solarpanelsystemflorida.com
testdummylab.com
1728025.com
vrpreservation.com
reinadelosfrikis.com
questionmaze.com
standingstoneevents.com
achraflaabassi.com
austinsubarusouth.com
africa-pif.com
the-hidden-places.com
boobieneckpillow.com
dvisionz.com
charlottescaife.com
shahedahtextiles.com
celebratewithlawilliams.com
sochobadlo.com
soccervest.com
hqyc04.com
lovepeacejoygratitude.com
pamsphils.com
miaportfolio.site
bednhomes.com
centellagoodyear.com
trubluau.com
geraheselouine.com
elkinart.com
next-setup-file.xyz
rashiratan.xyz
memotrace.com
groupdating.club
netflx-updt78f.com
ramonaestudiocreativo.com
giveawayconsumers.xyz
toponeswap.com
bestiephone.com
lifeharness.com
bikerleatherz.com
property-pleasant.website
thediamondbydoron.com
gamesredar.club
tiresgreat.info
actevate.xyz
drblowers.com
nasosd.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/284-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/284-8-0x000000000041EBA0-mapping.dmp formbook behavioral1/memory/268-9-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1468 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Paid Invoices_pdf.exePaid Invoices_pdf.exewuapp.exedescription pid process target process PID 784 set thread context of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 284 set thread context of 1268 284 Paid Invoices_pdf.exe Explorer.EXE PID 268 set thread context of 1268 268 wuapp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Paid Invoices_pdf.exewuapp.exepid process 284 Paid Invoices_pdf.exe 284 Paid Invoices_pdf.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe 268 wuapp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Paid Invoices_pdf.exewuapp.exepid process 284 Paid Invoices_pdf.exe 284 Paid Invoices_pdf.exe 284 Paid Invoices_pdf.exe 268 wuapp.exe 268 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Paid Invoices_pdf.exewuapp.exedescription pid process Token: SeDebugPrivilege 284 Paid Invoices_pdf.exe Token: SeDebugPrivilege 268 wuapp.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Paid Invoices_pdf.exeExplorer.EXEwuapp.exedescription pid process target process PID 784 wrote to memory of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 784 wrote to memory of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 784 wrote to memory of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 784 wrote to memory of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 784 wrote to memory of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 784 wrote to memory of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 784 wrote to memory of 284 784 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 1268 wrote to memory of 268 1268 Explorer.EXE wuapp.exe PID 1268 wrote to memory of 268 1268 Explorer.EXE wuapp.exe PID 1268 wrote to memory of 268 1268 Explorer.EXE wuapp.exe PID 1268 wrote to memory of 268 1268 Explorer.EXE wuapp.exe PID 1268 wrote to memory of 268 1268 Explorer.EXE wuapp.exe PID 1268 wrote to memory of 268 1268 Explorer.EXE wuapp.exe PID 1268 wrote to memory of 268 1268 Explorer.EXE wuapp.exe PID 268 wrote to memory of 1468 268 wuapp.exe cmd.exe PID 268 wrote to memory of 1468 268 wuapp.exe cmd.exe PID 268 wrote to memory of 1468 268 wuapp.exe cmd.exe PID 268 wrote to memory of 1468 268 wuapp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-9-0x0000000000000000-mapping.dmp
-
memory/268-10-0x0000000000EB0000-0x0000000000EBB000-memory.dmpFilesize
44KB
-
memory/268-12-0x00000000009B0000-0x0000000000A86000-memory.dmpFilesize
856KB
-
memory/284-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/284-8-0x000000000041EBA0-mapping.dmp
-
memory/784-2-0x00000000748A0000-0x0000000074F8E000-memory.dmpFilesize
6.9MB
-
memory/784-3-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/784-5-0x0000000004530000-0x0000000004542000-memory.dmpFilesize
72KB
-
memory/784-6-0x0000000005460000-0x00000000054C6000-memory.dmpFilesize
408KB
-
memory/1468-11-0x0000000000000000-mapping.dmp