Analysis
-
max time kernel
55s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 06:43
Static task
static1
Behavioral task
behavioral1
Sample
e045a1c03a7c10a04018920e7a5b656c.exe
Resource
win7v20201028
General
-
Target
e045a1c03a7c10a04018920e7a5b656c.exe
-
Size
898KB
-
MD5
e045a1c03a7c10a04018920e7a5b656c
-
SHA1
2c960252095bce6b2de024b9e1a7114d5ca8de55
-
SHA256
623c65639a4364546031c5edb9780ab9cbbe5e6713d09518805dcaded8e425a0
-
SHA512
85e19f67e0f49389334815cc865dc216fd19729bc18f4f00c05ba75469ddbc9bf5191db284605ccf03f2f1806948196dc7323b484effc4791e28d2c9865a9fed
Malware Config
Extracted
formbook
http://www.thesiromiel.com/kgw/
valentinakasu.com
soyelmatador.com
collaborativeprosperity.com
power8brokers.com
nexus-ink.com
manpasandmeatmarket.com
the-ethical-forums.today
maryannpark.com
bikininbodymommy.com
pxwuo.com
bigbangmerch.com
okaysinger.com
shopcarpe.com
rainbowhillsswimclub.com
crifinmarket.com
ebl-play.net
forceandsonsequipment.com
viagraytqwi.com
latashashop.com
suffocatinglymundanepodcast.com
metanoria.com
camera-kento.com
hotsaledeals.store
outlawgospelshow.com
saisaharashipping.com
buyiprod.com
pestigenix.com
opendesignpodcast.com
patentml.com
covaxbiotech.com
youjar.com
domvy.xyz
remodelmemphis.com
milehighdistributionllc.com
merchandisingpremium.com
fallguysmovile.com
actuelburo.xyz
nedlebow.com
shopcryptocurrency247.com
riellymoore.com
affinitymotorsales.com
akmh.pro
hsrrxs.com
atlanticdentallab.com
sagarpantry.com
murinemodel.com
karybeautycare.com
boshangkeji.com
dailynewstodays.com
oregonpyramids.com
dsjmzyz.com
gidagozlemevi.com
tribelessofficial.com
cyberonica.com
onehourcheckout.com
tenaflypedatrics.com
nbworldfire.com
setyourhead.com
manticore-habitat.com
iqftomatoes.com
fejsearesete.com
gregsgradeaappliancerepair.com
sfmfgco.com
directprnews.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2116-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2116-14-0x000000000041EB70-mapping.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
e045a1c03a7c10a04018920e7a5b656c.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e045a1c03a7c10a04018920e7a5b656c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e045a1c03a7c10a04018920e7a5b656c.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
e045a1c03a7c10a04018920e7a5b656c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e045a1c03a7c10a04018920e7a5b656c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 e045a1c03a7c10a04018920e7a5b656c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e045a1c03a7c10a04018920e7a5b656c.exedescription pid process target process PID 4076 set thread context of 2116 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
e045a1c03a7c10a04018920e7a5b656c.exee045a1c03a7c10a04018920e7a5b656c.exepid process 4076 e045a1c03a7c10a04018920e7a5b656c.exe 4076 e045a1c03a7c10a04018920e7a5b656c.exe 4076 e045a1c03a7c10a04018920e7a5b656c.exe 2116 e045a1c03a7c10a04018920e7a5b656c.exe 2116 e045a1c03a7c10a04018920e7a5b656c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e045a1c03a7c10a04018920e7a5b656c.exedescription pid process Token: SeDebugPrivilege 4076 e045a1c03a7c10a04018920e7a5b656c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e045a1c03a7c10a04018920e7a5b656c.exedescription pid process target process PID 4076 wrote to memory of 728 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 728 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 728 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 2116 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 2116 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 2116 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 2116 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 2116 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe PID 4076 wrote to memory of 2116 4076 e045a1c03a7c10a04018920e7a5b656c.exe e045a1c03a7c10a04018920e7a5b656c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e045a1c03a7c10a04018920e7a5b656c.exe"C:\Users\Admin\AppData\Local\Temp\e045a1c03a7c10a04018920e7a5b656c.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e045a1c03a7c10a04018920e7a5b656c.exe"C:\Users\Admin\AppData\Local\Temp\e045a1c03a7c10a04018920e7a5b656c.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\e045a1c03a7c10a04018920e7a5b656c.exe"C:\Users\Admin\AppData\Local\Temp\e045a1c03a7c10a04018920e7a5b656c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2116-13-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2116-14-0x000000000041EB70-mapping.dmp
-
memory/4076-2-0x00000000739A0000-0x000000007408E000-memory.dmpFilesize
6.9MB
-
memory/4076-3-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/4076-5-0x0000000005330000-0x0000000005331000-memory.dmpFilesize
4KB
-
memory/4076-6-0x00000000058D0000-0x00000000058D1000-memory.dmpFilesize
4KB
-
memory/4076-7-0x0000000005470000-0x0000000005471000-memory.dmpFilesize
4KB
-
memory/4076-8-0x00000000052E0000-0x00000000052E1000-memory.dmpFilesize
4KB
-
memory/4076-9-0x0000000005510000-0x0000000005511000-memory.dmpFilesize
4KB
-
memory/4076-10-0x0000000005440000-0x0000000005452000-memory.dmpFilesize
72KB
-
memory/4076-11-0x0000000006090000-0x00000000060F6000-memory.dmpFilesize
408KB
-
memory/4076-12-0x0000000006170000-0x0000000006171000-memory.dmpFilesize
4KB