Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 07:34
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe
Resource
win7v20201028
General
-
Target
RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe
-
Size
1.5MB
-
MD5
b2661762dc1e404771a05acaa650a8ad
-
SHA1
48a6b21d8df818d53da12fbf245dd0425719ca1d
-
SHA256
5fb176b2add40ae0aed7db10e9bf4755c86b63d66d4601370605b318d5bdb4b1
-
SHA512
eace4950d5a1f465411a4808265840acc9f95d095939b4c38b4854b7939593116e4c5e5de43c6bef982a7e41330f393effcea2249aa5aeea5c6125d3a022c01b
Malware Config
Extracted
formbook
http://www.insuranceforgrass.com/cdl/
camerawifichinhhang.info
fourruchos.com
linyomould.com
rockinghamseattle.com
yax95.com
gardenvaleps-athletics.com
fundaciojaumecasademont.cat
balpreetpankaj.com
flatlyforensics.com
nehyam.com
hundredpushup.com
iqellc.com
heemosco.com
wavegoodbyeto2020.com
idea2u.net
villamoonray.com
cloud9nutrition.com
propertybysyazliaty.com
chatbgsssjeni.com
babyessentialsonline.com
theunfilteredreviewer.com
nyscotarts.com
kingsheikh.com
navigatorcruisesapp.online
zarahcoll.com
fadedinfusions.com
charliesellscharlestonsc.com
auraatquaterpath.com
tzy027.com
garethjamesproperties.com
xn--b20b78vjoc1r8a.com
bestillsko.com
nyarlatho.com
ofleaves.com
thebaebutter.com
dhlcargopackersandmovers.com
audiovisualesjacr.com
centralharbormgmt.com
forexticket-th.com
reaera.xyz
wii2review5.club
st-insurance.net
sswgasia.com
silverdayzee.com
xn--planungsbro-stanko-u6b.com
marcellelizabeth.life
grroovepages.com
minevibe.net
ezhong.cool
mcj24.com
swiftsymphony.com
woodcrofthomeimprovement.com
alfijah.com
srishanmukhadevelopers.com
tnmsolutions.net
wheelshrine.com
groupmimoza.com
biaobazhongxin.com
elrodeorestaurantbw.com
bossupandwrite.com
ldmslondon.com
dldaduhui.com
llevel.club
pwrsbb.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2772-16-0x000000000041EC00-mapping.dmp formbook behavioral2/memory/2772-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3976-25-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exeRFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exemsiexec.exedescription pid process target process PID 3928 set thread context of 2772 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe PID 2772 set thread context of 2908 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe Explorer.EXE PID 3976 set thread context of 2908 3976 msiexec.exe Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exeRFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exemsiexec.exepid process 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe 3976 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exemsiexec.exepid process 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe 3976 msiexec.exe 3976 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exeRFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exemsiexec.exedescription pid process Token: SeDebugPrivilege 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe Token: SeDebugPrivilege 2772 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe Token: SeDebugPrivilege 3976 msiexec.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exeExplorer.EXEmsiexec.exedescription pid process target process PID 3928 wrote to memory of 1868 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe schtasks.exe PID 3928 wrote to memory of 1868 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe schtasks.exe PID 3928 wrote to memory of 1868 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe schtasks.exe PID 3928 wrote to memory of 2772 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe PID 3928 wrote to memory of 2772 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe PID 3928 wrote to memory of 2772 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe PID 3928 wrote to memory of 2772 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe PID 3928 wrote to memory of 2772 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe PID 3928 wrote to memory of 2772 3928 RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe PID 2908 wrote to memory of 3976 2908 Explorer.EXE msiexec.exe PID 2908 wrote to memory of 3976 2908 Explorer.EXE msiexec.exe PID 2908 wrote to memory of 3976 2908 Explorer.EXE msiexec.exe PID 3976 wrote to memory of 1132 3976 msiexec.exe cmd.exe PID 3976 wrote to memory of 1132 3976 msiexec.exe cmd.exe PID 3976 wrote to memory of 1132 3976 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ihfffYbnG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp378B.tmp"3⤵
- Creates scheduled task(s)
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_19-027-MP-010203 _ 19-028-MP-010203 _ 19-029-MP-04.exe"3⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ab85ffd95acbd536da8d2eeb187bd465
SHA1902640a732b491f075a5fde4aeb8b339dd3645ba
SHA2565d6760753ffe6dc974aff45b8068dee496ec452ad78b1c7b35ef237e27f15489
SHA51215fe3f2aa430853eb989ac1505ef6edf2dbbfe823b68fe8cf5bbe1a5e21308f863c985f94d6dbadfe79ff5957aba7704f9c13526d16188dae9947873a692bea0