Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 07:54
Static task
static1
Behavioral task
behavioral1
Sample
PO-23562#TZ232.exe
Resource
win7v20201028
General
-
Target
PO-23562#TZ232.exe
-
Size
1.5MB
-
MD5
357a14cfd77aeee6ccdefd6306790b6e
-
SHA1
515e8f43b3261329f2da96a7f0e873061c33cbd8
-
SHA256
cb2e173430a404a7cf52a54db1ff96b0de6eed1b8953d96b57e2780e45e71db9
-
SHA512
dafb6a5de58bf0a42b378c6e83271e55d28204cf1255fa702b1b312d9b6b31c68315241db9089a4ee09445c202baea1bcf51a33ce6132513bff0331c21d48682
Malware Config
Extracted
formbook
http://www.styrelseforum.com/p95n/
kimberlyrutledge.com
auctus.agency
johnemotions.com
guilt-brilliant.com
wxshangdian.com
theolivetreeonline.com
stellarfranchisebrands.com
every1no1.com
hoangthanhgroup.com
psm-gen.com
kingdomwow.com
digitalksr.com
karynpolitoforlg.com
youthdaycalgary.com
libertyhandymanservicesllc.com
breatheohio.com
allenleather.com
transformafter50.info
hnhsylsb.com
hmtradebd.com
besrhodislandhomes.com
zuwozo.com
southernhighlandsnails.com
kaaxg.com
bauer-cobolt.com
steelyourselfshop.net
linksoflondoncharmscheap.com
groundwork-pt.com
beautifulangelicskin.com
aduhelmfinancialsupport.com
xn--carpinteratarifa-hsb.com
thekingink.net
ocotegrill.com
gilbertdodge.com
insuranceinquirer.com
withagentcy.com
deeparchivesvpn.com
blamekd.com
acsdealta.xyz
dsxcj.com
kimonoshihan.com
bosquefamily.com
5587sk.com
integrative.life
unitedjournal.info
lynxdeck.com
onlyfanyou.com
aminomedicalscience.com
rachenstern-technik.com
thejewelrybox.net
stopcolleges.com
thesaltlifestyle.com
tappesupportservices.com
andrewgreenhomes.com
meidiansc.com
gobalexporter.com
rvpji571m.xyz
alwekalaaladabeya.com
scientificimaginetics.com
skaizenpharma.com
balloonpost.club
thefunnythingabout.com
premium-vitality.com
businesscalmcoaching.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1468-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1468-14-0x000000000041EDF0-mapping.dmp formbook behavioral2/memory/524-21-0x0000000003260000-0x000000000328E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO-23562#TZ232.exePO-23562#TZ232.exeexplorer.exedescription pid process target process PID 984 set thread context of 1468 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 1468 set thread context of 2784 1468 PO-23562#TZ232.exe Explorer.EXE PID 524 set thread context of 2784 524 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 55 IoCs
Processes:
PO-23562#TZ232.exePO-23562#TZ232.exeexplorer.exepid process 984 PO-23562#TZ232.exe 984 PO-23562#TZ232.exe 984 PO-23562#TZ232.exe 984 PO-23562#TZ232.exe 984 PO-23562#TZ232.exe 984 PO-23562#TZ232.exe 984 PO-23562#TZ232.exe 1468 PO-23562#TZ232.exe 1468 PO-23562#TZ232.exe 1468 PO-23562#TZ232.exe 1468 PO-23562#TZ232.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe 524 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PO-23562#TZ232.exeexplorer.exepid process 1468 PO-23562#TZ232.exe 1468 PO-23562#TZ232.exe 1468 PO-23562#TZ232.exe 524 explorer.exe 524 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO-23562#TZ232.exePO-23562#TZ232.exeexplorer.exedescription pid process Token: SeDebugPrivilege 984 PO-23562#TZ232.exe Token: SeDebugPrivilege 1468 PO-23562#TZ232.exe Token: SeDebugPrivilege 524 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2784 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
PO-23562#TZ232.exeExplorer.EXEexplorer.exedescription pid process target process PID 984 wrote to memory of 2840 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 2840 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 2840 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 3840 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 3840 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 3840 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 1468 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 1468 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 1468 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 1468 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 1468 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 984 wrote to memory of 1468 984 PO-23562#TZ232.exe PO-23562#TZ232.exe PID 2784 wrote to memory of 524 2784 Explorer.EXE explorer.exe PID 2784 wrote to memory of 524 2784 Explorer.EXE explorer.exe PID 2784 wrote to memory of 524 2784 Explorer.EXE explorer.exe PID 524 wrote to memory of 2148 524 explorer.exe cmd.exe PID 524 wrote to memory of 2148 524 explorer.exe cmd.exe PID 524 wrote to memory of 2148 524 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"{path}"3⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"{path}"3⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2988
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1476
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1060
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"3⤵PID:2148