Analysis
-
max time kernel
151s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-01-2021 08:35
Static task
static1
Behavioral task
behavioral1
Sample
180120211200.exe
Resource
win7v20201028
General
-
Target
180120211200.exe
-
Size
1.1MB
-
MD5
293b5da09841ae1984a6478fd3caaf24
-
SHA1
c903950fef8f029eda21f9bfe44f0c347471de35
-
SHA256
29f154b8c244af71ad5dda7bee1e41896e78cf7e5f189219754962c10bcd4183
-
SHA512
1f939e12af338e655444bf300ce0059a7eb2a67a5a4447282231ca41b5d48be8f8953a01cd551922006908383f2ee4df9f53ba745123f6bb152c3ee191b266bd
Malware Config
Extracted
formbook
http://www.southsideflooringcreations.com/dkk/
goldenfarmm.com
miproper.com
theutahan.com
efeteenerji.com
wellfarehealth.com
setricoo.com
enjoyablephotobooths.com
semaindustrial.com
jennywet.com
jackhughesart.com
cantgetryte.com
searko.com
zxrxhuny.icu
exoticorganicwine.com
fordexplorerproblems.com
locationwebtv.net
elinvoimainenperhe.com
mundoclik.com
nouvellenormale.com
talasnakliyat.com
mundusabsurdus.com
leathercustomgrips.com
5523.xyz
aaabizmedia.com
sandrasantoss.com
sellitech.net
pangeleia.com
risepasal.com
ruidev.site
blogthatanswer.com
cormacknnl.com
coolfishartist.com
jessicaasiankitchen.com
hinikerco.com
dragonflyaerialimagery.net
dhtmlkits.com
miacella.com
mvipfb.com
108-bet.com
lancru-baikyaku.xyz
hkgerry.com
solarpanelsgreenenergy.com
traditionalcookingacademy.com
freecarandhome.com
naturacake.com
dreambuildarchitect.com
ortigiarealty.com
datings.life
willtecint.com
newlife-here.com
850712.com
fallguysskin.com
portaldoctortv.com
nocodehosting.com
ornhealthcare.com
amkuyidl.icu
trinewstyles.com
rabninco.com
trapusaapparel.com
mystiquerubirosarum.com
xn--mundocao-j3a.com
226basketball.com
goodj.online
congratulationsbanner.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/976-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/976-11-0x000000000041EC00-mapping.dmp formbook behavioral1/memory/1744-19-0x00000000000D0000-0x00000000000FE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1148 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
180120211200.exe180120211200.exewscript.exedescription pid process target process PID 2028 set thread context of 976 2028 180120211200.exe 180120211200.exe PID 976 set thread context of 1252 976 180120211200.exe Explorer.EXE PID 1744 set thread context of 1252 1744 wscript.exe Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
180120211200.exe180120211200.exewscript.exepid process 2028 180120211200.exe 2028 180120211200.exe 976 180120211200.exe 976 180120211200.exe 1744 wscript.exe 1744 wscript.exe 1744 wscript.exe 1744 wscript.exe 1744 wscript.exe 1744 wscript.exe 1744 wscript.exe 1744 wscript.exe 1744 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
180120211200.exewscript.exepid process 976 180120211200.exe 976 180120211200.exe 976 180120211200.exe 1744 wscript.exe 1744 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
180120211200.exe180120211200.exewscript.exedescription pid process Token: SeDebugPrivilege 2028 180120211200.exe Token: SeDebugPrivilege 976 180120211200.exe Token: SeDebugPrivilege 1744 wscript.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
180120211200.exeExplorer.EXEwscript.exedescription pid process target process PID 2028 wrote to memory of 2004 2028 180120211200.exe schtasks.exe PID 2028 wrote to memory of 2004 2028 180120211200.exe schtasks.exe PID 2028 wrote to memory of 2004 2028 180120211200.exe schtasks.exe PID 2028 wrote to memory of 2004 2028 180120211200.exe schtasks.exe PID 2028 wrote to memory of 268 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 268 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 268 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 268 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 976 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 976 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 976 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 976 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 976 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 976 2028 180120211200.exe 180120211200.exe PID 2028 wrote to memory of 976 2028 180120211200.exe 180120211200.exe PID 1252 wrote to memory of 1744 1252 Explorer.EXE wscript.exe PID 1252 wrote to memory of 1744 1252 Explorer.EXE wscript.exe PID 1252 wrote to memory of 1744 1252 Explorer.EXE wscript.exe PID 1252 wrote to memory of 1744 1252 Explorer.EXE wscript.exe PID 1744 wrote to memory of 1148 1744 wscript.exe cmd.exe PID 1744 wrote to memory of 1148 1744 wscript.exe cmd.exe PID 1744 wrote to memory of 1148 1744 wscript.exe cmd.exe PID 1744 wrote to memory of 1148 1744 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\180120211200.exe"C:\Users\Admin\AppData\Local\Temp\180120211200.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HNQrxVm" /XML "C:\Users\Admin\AppData\Local\Temp\tmp934A.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\180120211200.exe"C:\Users\Admin\AppData\Local\Temp\180120211200.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\180120211200.exe"C:\Users\Admin\AppData\Local\Temp\180120211200.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\180120211200.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp934A.tmpMD5
115b9efe4e4e915bb1fc5ef8c4a155ea
SHA10ebbbe3617510d415cf7dd45d1de5ce0b332f08d
SHA256af105b9223159b13b1494c7c87afe6b54723cdb972059589559a6e14279f8d74
SHA5121d4713001995f2153c7d573a543ff24373d2a7da4ffaba6ffbdd4f56a7c803cbaf24b95f01c4372c3a9ac476eb397be3817c89fed613740c232caf8b3ea6eb30
-
memory/976-10-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/976-14-0x0000000000290000-0x00000000002A4000-memory.dmpFilesize
80KB
-
memory/976-13-0x0000000000B60000-0x0000000000E63000-memory.dmpFilesize
3.0MB
-
memory/976-11-0x000000000041EC00-mapping.dmp
-
memory/1148-17-0x0000000000000000-mapping.dmp
-
memory/1252-15-0x0000000006CE0000-0x0000000006E6F000-memory.dmpFilesize
1.6MB
-
memory/1744-16-0x0000000000000000-mapping.dmp
-
memory/1744-19-0x00000000000D0000-0x00000000000FE000-memory.dmpFilesize
184KB
-
memory/1744-20-0x0000000000BE0000-0x0000000000EE3000-memory.dmpFilesize
3.0MB
-
memory/1744-18-0x0000000000FC0000-0x0000000000FE6000-memory.dmpFilesize
152KB
-
memory/1744-21-0x0000000000A00000-0x0000000000A93000-memory.dmpFilesize
588KB
-
memory/2004-8-0x0000000000000000-mapping.dmp
-
memory/2028-7-0x0000000004CF0000-0x0000000004D9B000-memory.dmpFilesize
684KB
-
memory/2028-6-0x00000000005F0000-0x0000000000603000-memory.dmpFilesize
76KB
-
memory/2028-5-0x0000000004CB0000-0x0000000004CB1000-memory.dmpFilesize
4KB
-
memory/2028-2-0x0000000074EE0000-0x00000000755CE000-memory.dmpFilesize
6.9MB
-
memory/2028-3-0x0000000000A40000-0x0000000000A41000-memory.dmpFilesize
4KB