Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 07:14
Static task
static1
Behavioral task
behavioral1
Sample
15012021546.exe
Resource
win7v20201028
General
-
Target
15012021546.exe
-
Size
893KB
-
MD5
85c2653a529637c000fa5ac67665dcb3
-
SHA1
a04c8cf5f68a0f2e5f40f5632fbbbcdaf6811cb1
-
SHA256
cf5a2454c16d739c04939e84f71d62772620f7d0f90df49266e8493393da7167
-
SHA512
79d5783b74389ded2c2189f93be15d897794978637ef124c6ab7f12e9c72a1f4a84f48853f24d4f06afc23660c79ea1adf683c7d770fa697e6adc00933ab0ff6
Malware Config
Extracted
formbook
http://www.southsideflooringcreations.com/dkk/
goldenfarmm.com
miproper.com
theutahan.com
efeteenerji.com
wellfarehealth.com
setricoo.com
enjoyablephotobooths.com
semaindustrial.com
jennywet.com
jackhughesart.com
cantgetryte.com
searko.com
zxrxhuny.icu
exoticorganicwine.com
fordexplorerproblems.com
locationwebtv.net
elinvoimainenperhe.com
mundoclik.com
nouvellenormale.com
talasnakliyat.com
mundusabsurdus.com
leathercustomgrips.com
5523.xyz
aaabizmedia.com
sandrasantoss.com
sellitech.net
pangeleia.com
risepasal.com
ruidev.site
blogthatanswer.com
cormacknnl.com
coolfishartist.com
jessicaasiankitchen.com
hinikerco.com
dragonflyaerialimagery.net
dhtmlkits.com
miacella.com
mvipfb.com
108-bet.com
lancru-baikyaku.xyz
hkgerry.com
solarpanelsgreenenergy.com
traditionalcookingacademy.com
freecarandhome.com
naturacake.com
dreambuildarchitect.com
ortigiarealty.com
datings.life
willtecint.com
newlife-here.com
850712.com
fallguysskin.com
portaldoctortv.com
nocodehosting.com
ornhealthcare.com
amkuyidl.icu
trinewstyles.com
rabninco.com
trapusaapparel.com
mystiquerubirosarum.com
xn--mundocao-j3a.com
226basketball.com
goodj.online
congratulationsbanner.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4068-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4068-13-0x000000000041EC00-mapping.dmp formbook behavioral2/memory/4092-14-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
15012021546.exe15012021546.exesystray.exedescription pid process target process PID 4764 set thread context of 4068 4764 15012021546.exe 15012021546.exe PID 4068 set thread context of 2640 4068 15012021546.exe Explorer.EXE PID 4092 set thread context of 2640 4092 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
15012021546.exesystray.exepid process 4068 15012021546.exe 4068 15012021546.exe 4068 15012021546.exe 4068 15012021546.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe 4092 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
15012021546.exesystray.exepid process 4068 15012021546.exe 4068 15012021546.exe 4068 15012021546.exe 4092 systray.exe 4092 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
15012021546.exesystray.exedescription pid process Token: SeDebugPrivilege 4068 15012021546.exe Token: SeDebugPrivilege 4092 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
15012021546.exeExplorer.EXEsystray.exedescription pid process target process PID 4764 wrote to memory of 4068 4764 15012021546.exe 15012021546.exe PID 4764 wrote to memory of 4068 4764 15012021546.exe 15012021546.exe PID 4764 wrote to memory of 4068 4764 15012021546.exe 15012021546.exe PID 4764 wrote to memory of 4068 4764 15012021546.exe 15012021546.exe PID 4764 wrote to memory of 4068 4764 15012021546.exe 15012021546.exe PID 4764 wrote to memory of 4068 4764 15012021546.exe 15012021546.exe PID 2640 wrote to memory of 4092 2640 Explorer.EXE systray.exe PID 2640 wrote to memory of 4092 2640 Explorer.EXE systray.exe PID 2640 wrote to memory of 4092 2640 Explorer.EXE systray.exe PID 4092 wrote to memory of 1912 4092 systray.exe cmd.exe PID 4092 wrote to memory of 1912 4092 systray.exe cmd.exe PID 4092 wrote to memory of 1912 4092 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\15012021546.exe"C:\Users\Admin\AppData\Local\Temp\15012021546.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\15012021546.exe"C:\Users\Admin\AppData\Local\Temp\15012021546.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\15012021546.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1912-17-0x0000000000000000-mapping.dmp
-
memory/2640-19-0x0000000002530000-0x00000000025E8000-memory.dmpFilesize
736KB
-
memory/4068-12-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/4068-13-0x000000000041EC00-mapping.dmp
-
memory/4092-16-0x0000000000040000-0x0000000000046000-memory.dmpFilesize
24KB
-
memory/4092-15-0x0000000000040000-0x0000000000046000-memory.dmpFilesize
24KB
-
memory/4092-14-0x0000000000000000-mapping.dmp
-
memory/4764-7-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/4764-11-0x0000000005CB0000-0x0000000005D16000-memory.dmpFilesize
408KB
-
memory/4764-10-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/4764-9-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/4764-8-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/4764-2-0x0000000073370000-0x0000000073A5E000-memory.dmpFilesize
6.9MB
-
memory/4764-6-0x0000000005580000-0x0000000005581000-memory.dmpFilesize
4KB
-
memory/4764-5-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/4764-3-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB