Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 08:20
Static task
static1
Behavioral task
behavioral1
Sample
PO2364#FD212003.exe
Resource
win7v20201028
General
-
Target
PO2364#FD212003.exe
-
Size
1.0MB
-
MD5
b7c168ea63b8e1c2fa7eb4059d85283e
-
SHA1
a41f448c52e01434275c86b928b8b64222e77734
-
SHA256
f03367cb1758bddd8877e7aca02223797330fc8482d6ffce6f397730ffefd53f
-
SHA512
b4cac0d652270d385014b0ef90159e279b768f1061ae1086e9df4043a838faed4585dc38b08426e76cc4c39d2c5ed7ccf399e28107eb8dd26011efed3a02cb63
Malware Config
Extracted
formbook
http://www.styrelseforum.com/p95n/
kimberlyrutledge.com
auctus.agency
johnemotions.com
guilt-brilliant.com
wxshangdian.com
theolivetreeonline.com
stellarfranchisebrands.com
every1no1.com
hoangthanhgroup.com
psm-gen.com
kingdomwow.com
digitalksr.com
karynpolitoforlg.com
youthdaycalgary.com
libertyhandymanservicesllc.com
breatheohio.com
allenleather.com
transformafter50.info
hnhsylsb.com
hmtradebd.com
besrhodislandhomes.com
zuwozo.com
southernhighlandsnails.com
kaaxg.com
bauer-cobolt.com
steelyourselfshop.net
linksoflondoncharmscheap.com
groundwork-pt.com
beautifulangelicskin.com
aduhelmfinancialsupport.com
xn--carpinteratarifa-hsb.com
thekingink.net
ocotegrill.com
gilbertdodge.com
insuranceinquirer.com
withagentcy.com
deeparchivesvpn.com
blamekd.com
acsdealta.xyz
dsxcj.com
kimonoshihan.com
bosquefamily.com
5587sk.com
integrative.life
unitedjournal.info
lynxdeck.com
onlyfanyou.com
aminomedicalscience.com
rachenstern-technik.com
thejewelrybox.net
stopcolleges.com
thesaltlifestyle.com
tappesupportservices.com
andrewgreenhomes.com
meidiansc.com
gobalexporter.com
rvpji571m.xyz
alwekalaaladabeya.com
scientificimaginetics.com
skaizenpharma.com
balloonpost.club
thefunnythingabout.com
premium-vitality.com
businesscalmcoaching.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3960-3-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3960-4-0x000000000041EDF0-mapping.dmp formbook behavioral2/memory/4068-13-0x0000000000D10000-0x0000000000D3E000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
PO2364#FD212003.exePO2364#FD212003.exesystray.exedescription pid process target process PID 492 set thread context of 3960 492 PO2364#FD212003.exe PO2364#FD212003.exe PID 3960 set thread context of 3128 3960 PO2364#FD212003.exe Explorer.EXE PID 3960 set thread context of 3128 3960 PO2364#FD212003.exe Explorer.EXE PID 4068 set thread context of 3128 4068 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
PO2364#FD212003.exesystray.exepid process 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe 4068 systray.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
PO2364#FD212003.exesystray.exepid process 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 3960 PO2364#FD212003.exe 4068 systray.exe 4068 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO2364#FD212003.exesystray.exedescription pid process Token: SeDebugPrivilege 3960 PO2364#FD212003.exe Token: SeDebugPrivilege 4068 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PO2364#FD212003.exePO2364#FD212003.exesystray.exedescription pid process target process PID 492 wrote to memory of 3960 492 PO2364#FD212003.exe PO2364#FD212003.exe PID 492 wrote to memory of 3960 492 PO2364#FD212003.exe PO2364#FD212003.exe PID 492 wrote to memory of 3960 492 PO2364#FD212003.exe PO2364#FD212003.exe PID 492 wrote to memory of 3960 492 PO2364#FD212003.exe PO2364#FD212003.exe PID 492 wrote to memory of 3960 492 PO2364#FD212003.exe PO2364#FD212003.exe PID 492 wrote to memory of 3960 492 PO2364#FD212003.exe PO2364#FD212003.exe PID 3960 wrote to memory of 4068 3960 PO2364#FD212003.exe systray.exe PID 3960 wrote to memory of 4068 3960 PO2364#FD212003.exe systray.exe PID 3960 wrote to memory of 4068 3960 PO2364#FD212003.exe systray.exe PID 4068 wrote to memory of 1412 4068 systray.exe cmd.exe PID 4068 wrote to memory of 1412 4068 systray.exe cmd.exe PID 4068 wrote to memory of 1412 4068 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\PO2364#FD212003.exe"C:\Users\Admin\AppData\Local\Temp\PO2364#FD212003.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO2364#FD212003.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO2364#FD212003.exe"5⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/492-2-0x0000000002D40000-0x0000000002D41000-memory.dmpFilesize
4KB
-
memory/1412-14-0x0000000000000000-mapping.dmp
-
memory/3128-10-0x0000000005B00000-0x0000000005C13000-memory.dmpFilesize
1.1MB
-
memory/3128-17-0x0000000001350000-0x000000000140A000-memory.dmpFilesize
744KB
-
memory/3128-7-0x0000000006CA0000-0x0000000006E3D000-memory.dmpFilesize
1.6MB
-
memory/3960-6-0x0000000001650000-0x0000000001664000-memory.dmpFilesize
80KB
-
memory/3960-8-0x00000000012F0000-0x0000000001610000-memory.dmpFilesize
3.1MB
-
memory/3960-9-0x0000000003110000-0x0000000003124000-memory.dmpFilesize
80KB
-
memory/3960-4-0x000000000041EDF0-mapping.dmp
-
memory/3960-3-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/4068-11-0x0000000000000000-mapping.dmp
-
memory/4068-12-0x0000000000E40000-0x0000000000E46000-memory.dmpFilesize
24KB
-
memory/4068-13-0x0000000000D10000-0x0000000000D3E000-memory.dmpFilesize
184KB
-
memory/4068-15-0x0000000004E10000-0x0000000005130000-memory.dmpFilesize
3.1MB
-
memory/4068-16-0x0000000005130000-0x00000000051C3000-memory.dmpFilesize
588KB