Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 15:54
Static task
static1
Behavioral task
behavioral1
Sample
Paid Invoices_pdf.exe
Resource
win7v20201028
General
-
Target
Paid Invoices_pdf.exe
-
Size
738KB
-
MD5
0326b2ad0ec402ad9421d6dbb1d4b93e
-
SHA1
f52d2a7b483499334ce084671b874ee3ad921511
-
SHA256
7a0468a1843e1d6b3e6ad5bdb9f3e1ad2131349fbaf0ac9737f212bca59ce783
-
SHA512
fee6512b00c39a93f5aeb88d9fa6ccd96c2d8bdf6d1bfb53924e5dc002e2b450dd9028dcd9633ae0aa58bab036834d70ae74f1913009e8e092fe0ef02474a159
Malware Config
Extracted
formbook
http://www.transparentpetcrate.com/lnb/
sauschwein.info
ywpntv.com
gironbeautysalon.online
cryptogeekstuff.com
leosrock.com
sistersv.space
ilss.life
vshuzi.com
europeanculinarymagic.com
mdtlalab.com
boletasenorden.com
eebushe11.com
sms8888.com
arrogantjerxs.com
aboudmotors.com
vzuels.com
searko.com
thathealthysoul.com
365wt38493984284.com
solarpanelsystemflorida.com
testdummylab.com
1728025.com
vrpreservation.com
reinadelosfrikis.com
questionmaze.com
standingstoneevents.com
achraflaabassi.com
austinsubarusouth.com
africa-pif.com
the-hidden-places.com
boobieneckpillow.com
dvisionz.com
charlottescaife.com
shahedahtextiles.com
celebratewithlawilliams.com
sochobadlo.com
soccervest.com
hqyc04.com
lovepeacejoygratitude.com
pamsphils.com
miaportfolio.site
bednhomes.com
centellagoodyear.com
trubluau.com
geraheselouine.com
elkinart.com
next-setup-file.xyz
rashiratan.xyz
memotrace.com
groupdating.club
netflx-updt78f.com
ramonaestudiocreativo.com
giveawayconsumers.xyz
toponeswap.com
bestiephone.com
lifeharness.com
bikerleatherz.com
property-pleasant.website
thediamondbydoron.com
gamesredar.club
tiresgreat.info
actevate.xyz
drblowers.com
nasosd.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/452-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/452-13-0x000000000041EBA0-mapping.dmp formbook behavioral2/memory/680-15-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Paid Invoices_pdf.exePaid Invoices_pdf.execolorcpl.exedescription pid process target process PID 4804 set thread context of 452 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 452 set thread context of 3152 452 Paid Invoices_pdf.exe Explorer.EXE PID 680 set thread context of 3152 680 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
Paid Invoices_pdf.exePaid Invoices_pdf.execolorcpl.exepid process 4804 Paid Invoices_pdf.exe 4804 Paid Invoices_pdf.exe 452 Paid Invoices_pdf.exe 452 Paid Invoices_pdf.exe 452 Paid Invoices_pdf.exe 452 Paid Invoices_pdf.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe 680 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Paid Invoices_pdf.execolorcpl.exepid process 452 Paid Invoices_pdf.exe 452 Paid Invoices_pdf.exe 452 Paid Invoices_pdf.exe 680 colorcpl.exe 680 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Paid Invoices_pdf.exePaid Invoices_pdf.execolorcpl.exedescription pid process Token: SeDebugPrivilege 4804 Paid Invoices_pdf.exe Token: SeDebugPrivilege 452 Paid Invoices_pdf.exe Token: SeDebugPrivilege 680 colorcpl.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3152 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Paid Invoices_pdf.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 4804 wrote to memory of 2604 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 2604 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 2604 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 452 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 452 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 452 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 452 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 452 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 4804 wrote to memory of 452 4804 Paid Invoices_pdf.exe Paid Invoices_pdf.exe PID 3152 wrote to memory of 680 3152 Explorer.EXE colorcpl.exe PID 3152 wrote to memory of 680 3152 Explorer.EXE colorcpl.exe PID 3152 wrote to memory of 680 3152 Explorer.EXE colorcpl.exe PID 680 wrote to memory of 1008 680 colorcpl.exe cmd.exe PID 680 wrote to memory of 1008 680 colorcpl.exe cmd.exe PID 680 wrote to memory of 1008 680 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Paid Invoices_pdf.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/452-12-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/452-13-0x000000000041EBA0-mapping.dmp
-
memory/680-17-0x0000000000B00000-0x0000000000B19000-memory.dmpFilesize
100KB
-
memory/680-16-0x0000000000B00000-0x0000000000B19000-memory.dmpFilesize
100KB
-
memory/680-15-0x0000000000000000-mapping.dmp
-
memory/1008-18-0x0000000000000000-mapping.dmp
-
memory/4804-6-0x00000000057A0000-0x00000000057A1000-memory.dmpFilesize
4KB
-
memory/4804-10-0x00000000054E0000-0x00000000054F2000-memory.dmpFilesize
72KB
-
memory/4804-11-0x0000000005F20000-0x0000000005F86000-memory.dmpFilesize
408KB
-
memory/4804-9-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/4804-8-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/4804-7-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/4804-2-0x00000000739D0000-0x00000000740BE000-memory.dmpFilesize
6.9MB
-
memory/4804-5-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/4804-3-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB