Analysis
-
max time kernel
147s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 07:56
Static task
static1
Behavioral task
behavioral1
Sample
2021_50SG0BK00T1,pdf.exe
Resource
win7v20201028
General
-
Target
2021_50SG0BK00T1,pdf.exe
-
Size
1.0MB
-
MD5
89f2269c6b922334a760d393a84e14f5
-
SHA1
c745861fede33861fb7ecb4e74fec7ffc2f65838
-
SHA256
e7063cc17e4ab85b0ae947f6366f4a955758d2e3ef81bb2476f77aec1f77daae
-
SHA512
3779f0399da5297c82086512b516fb6bfd05df9831c995001988bf0cbe2fe20258316c9e19e3810240e0414a059f7132d73835a9cfa4cc8ab5845d98887a46ce
Malware Config
Extracted
formbook
http://www.radissonhotelsusa.com/cp5/
glcpunix.com
marabierta-coaching.com
osrs-remastered.com
lineagehealthxwellness.com
dunyadagezilecekyerler.com
negociosyfinanzasfaciles.com
bifa510.com
houseofutamasa.com
dopeneeds.com
sailacc.com
thewindgallery.com
elvinrisky.com
flowersassistedliving.com
lzbnwy.com
mrpentester.com
joinmytradingteam.com
jasabuatvisa.com
meherunnessa-foundation.com
notyourtypicaljocks.com
lobo-sports.com
nails-of-art.com
skinatoms.com
huadijc.com
elegantligting.com
zwasperr.com
401ne19thstapt51.com
semedburiti.com
andieweb.com
best20hookups.com
planttan.com
entrenamientoenequilibrio.com
newsecho.net
cocktailcrates.com
gurumedicalsupplies.com
legaca.trade
carscompetition.com
disloc.net
hsupi.com
s-sgasia.com
dictuse.xyz
vayocart.com
boxedhawaii.com
wateryourlandscape.com
countrytouring.com
shifamedico.com
gdhymc.com
sessionsup.com
viettellongxuyen.com
shindeconstruction.com
theautocareshop.com
maxwellgolf.com
hongdajunheng.com
mwakossolutions.com
fabulashpro.com
sklsdcollege.com
sensualblogs.com
gtainsinde.com
nehyam.com
itool.group
noblehare.com
amylaib.com
photosbylanie.com
palmoiltech.com
harrypotterwithguna.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1488-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1488-11-0x000000000041EBF0-mapping.dmp formbook behavioral1/memory/824-20-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
2021_50SG0BK00T1,pdf.exeMSBuild.exewlanext.exedescription pid process target process PID 1740 set thread context of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1488 set thread context of 1268 1488 MSBuild.exe Explorer.EXE PID 1488 set thread context of 1268 1488 MSBuild.exe Explorer.EXE PID 824 set thread context of 1268 824 wlanext.exe Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
MSBuild.exewlanext.exepid process 1488 MSBuild.exe 1488 MSBuild.exe 1488 MSBuild.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe 824 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MSBuild.exewlanext.exepid process 1488 MSBuild.exe 1488 MSBuild.exe 1488 MSBuild.exe 1488 MSBuild.exe 824 wlanext.exe 824 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2021_50SG0BK00T1,pdf.exeMSBuild.exewlanext.exedescription pid process Token: SeDebugPrivilege 1740 2021_50SG0BK00T1,pdf.exe Token: SeDebugPrivilege 1488 MSBuild.exe Token: SeDebugPrivilege 824 wlanext.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
2021_50SG0BK00T1,pdf.exeExplorer.EXEwlanext.exedescription pid process target process PID 1740 wrote to memory of 1080 1740 2021_50SG0BK00T1,pdf.exe schtasks.exe PID 1740 wrote to memory of 1080 1740 2021_50SG0BK00T1,pdf.exe schtasks.exe PID 1740 wrote to memory of 1080 1740 2021_50SG0BK00T1,pdf.exe schtasks.exe PID 1740 wrote to memory of 1080 1740 2021_50SG0BK00T1,pdf.exe schtasks.exe PID 1740 wrote to memory of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1740 wrote to memory of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1740 wrote to memory of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1740 wrote to memory of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1740 wrote to memory of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1740 wrote to memory of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1740 wrote to memory of 1488 1740 2021_50SG0BK00T1,pdf.exe MSBuild.exe PID 1268 wrote to memory of 824 1268 Explorer.EXE wlanext.exe PID 1268 wrote to memory of 824 1268 Explorer.EXE wlanext.exe PID 1268 wrote to memory of 824 1268 Explorer.EXE wlanext.exe PID 1268 wrote to memory of 824 1268 Explorer.EXE wlanext.exe PID 824 wrote to memory of 852 824 wlanext.exe cmd.exe PID 824 wrote to memory of 852 824 wlanext.exe cmd.exe PID 824 wrote to memory of 852 824 wlanext.exe cmd.exe PID 824 wrote to memory of 852 824 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\2021_50SG0BK00T1,pdf.exe"C:\Users\Admin\AppData\Local\Temp\2021_50SG0BK00T1,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uQbWwWGLjoOA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1EA8.tmp"3⤵
- Creates scheduled task(s)
PID:1080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2c6815719e8e92a21f28b78ff1ede6fb
SHA14f5a6910d31911c7cad94bf8e8b5dd975b09af90
SHA2560e1e6cd2a66579e643b549afe6b645e97edfe926c3e9b96c8779d7dee6ed241e
SHA512218050d0482f3109dd6735a67e7aab7ee4893e8cdfd9d5fa9805268dd35f23e730bb7a2c875b27edd3c2bb50d1c6270ad7fce912c5e529f07ca8912125aaf002