Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 07:55
Static task
static1
Behavioral task
behavioral1
Sample
Details for bookings.exe
Resource
win7v20201028
General
-
Target
Details for bookings.exe
-
Size
999KB
-
MD5
a25a89b6290bd06ba2bd66ef1ff7b4d1
-
SHA1
5596b820a3ce13c56473185ad4f67079c4ac3f8d
-
SHA256
39872cee88d7cf4d0f0cc42d09348b6fea960a62861fab210bf257c4e6bc3a36
-
SHA512
6a88385d5d653ee01e6251b944de4da855fac18054ede73e8bdae8a30ac832d3a83b8c7ed8bd7c2cf04b855ea9d3fb9032d7560bc25f6d6947ca921b2a8d96a4
Malware Config
Extracted
formbook
http://www.deuxus.com/t052/
ladybug-learning.com
unforgottenstory.com
oldmopaiv.xyz
natashaexim.com
hannahmcelgunn.com
retargetingmachines.info
njoconline.com
unicornlankadelivery.com
giftkerala.com
englishfordoctors.online
schatzilandrvresort.com
brujoisaac.com
basiccampinggear.com
escapees.today
dgyxsy888.com
stevebana.xyz
mimozakebap.com
ezdoff.com
pluumyspalace.com
shaoshanshan.com
crazyvine.wine
sfjt55.com
xjgqh.com
netverificatie-home.info
efnew.com
welderweb.com
2ndstars.com
parrotpink.com
sarahjanehammock.com
pizzawestpalmbeach.com
pivot-branding.com
bribiebootcamp.com
floridaincontinencetherapy.com
muddanyc.com
pflegedienst-24-7.com
kunstradar.com
coolgadgetsdominate.com
comedynationlive.com
workoutandlawn.com
orangecountyvolvolease.com
sunrisemath.com
premiumenterprisegroup.com
mnglobalplatform.com
bijie.xyz
christiandailyusa.com
kismetestatestjohn.com
bobyworks.com
h2cooker.com
kimquint.com
torturechamberproductions.com
superbbsuper.com
bibleandkoran.net
oncuecollective.com
strat-fundamentals.info
taichi.chat
beautyroomgreenwich.com
686761.com
prostatamrt.net
medicina-genomica.com
hl022.com
forestlawnfunerals.com
charismayachts.com
sublimequalitystore.com
bowvacare.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/524-8-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/524-9-0x000000000041ECC0-mapping.dmp formbook behavioral1/memory/112-16-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 624 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Details for bookings.exeDetails for bookings.exewininit.exedescription pid process target process PID 1832 set thread context of 524 1832 Details for bookings.exe Details for bookings.exe PID 524 set thread context of 1196 524 Details for bookings.exe Explorer.EXE PID 112 set thread context of 1196 112 wininit.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
Details for bookings.exeDetails for bookings.exewininit.exepid process 1832 Details for bookings.exe 524 Details for bookings.exe 524 Details for bookings.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe 112 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Details for bookings.exewininit.exepid process 524 Details for bookings.exe 524 Details for bookings.exe 524 Details for bookings.exe 112 wininit.exe 112 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Details for bookings.exeDetails for bookings.exewininit.exedescription pid process Token: SeDebugPrivilege 1832 Details for bookings.exe Token: SeDebugPrivilege 524 Details for bookings.exe Token: SeDebugPrivilege 112 wininit.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Details for bookings.exeExplorer.EXEwininit.exedescription pid process target process PID 1832 wrote to memory of 524 1832 Details for bookings.exe Details for bookings.exe PID 1832 wrote to memory of 524 1832 Details for bookings.exe Details for bookings.exe PID 1832 wrote to memory of 524 1832 Details for bookings.exe Details for bookings.exe PID 1832 wrote to memory of 524 1832 Details for bookings.exe Details for bookings.exe PID 1832 wrote to memory of 524 1832 Details for bookings.exe Details for bookings.exe PID 1832 wrote to memory of 524 1832 Details for bookings.exe Details for bookings.exe PID 1832 wrote to memory of 524 1832 Details for bookings.exe Details for bookings.exe PID 1196 wrote to memory of 112 1196 Explorer.EXE wininit.exe PID 1196 wrote to memory of 112 1196 Explorer.EXE wininit.exe PID 1196 wrote to memory of 112 1196 Explorer.EXE wininit.exe PID 1196 wrote to memory of 112 1196 Explorer.EXE wininit.exe PID 112 wrote to memory of 624 112 wininit.exe cmd.exe PID 112 wrote to memory of 624 112 wininit.exe cmd.exe PID 112 wrote to memory of 624 112 wininit.exe cmd.exe PID 112 wrote to memory of 624 112 wininit.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Details for bookings.exe"C:\Users\Admin\AppData\Local\Temp\Details for bookings.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Details for bookings.exe"C:\Users\Admin\AppData\Local\Temp\Details for bookings.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:524 -
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Details for bookings.exe"3⤵
- Deletes itself
PID:624