Analysis
-
max time kernel
147s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 12:53
Static task
static1
Behavioral task
behavioral1
Sample
W21_0191,pdf.exe
Resource
win7v20201028
General
-
Target
W21_0191,pdf.exe
-
Size
1.0MB
-
MD5
2b71bd4f414944163720bffe66296f21
-
SHA1
7c86106022e7b4150d0ba2709f4df368c4b8bc15
-
SHA256
9bf3bb9e44490d5836c31036a78c59c92a51d8f6bfb33363d8c617d27967ff3f
-
SHA512
8eeb0bbcefd0109a82c806d7740a8fe4b6f811a352d20772362302ba2ed615351a0bb3df18f1cd8d5ae28cc1ff7e3bd19333d546b4e4e0faf194ee068b905a7b
Malware Config
Extracted
formbook
http://www.radissonhotelsusa.com/cp5/
glcpunix.com
marabierta-coaching.com
osrs-remastered.com
lineagehealthxwellness.com
dunyadagezilecekyerler.com
negociosyfinanzasfaciles.com
bifa510.com
houseofutamasa.com
dopeneeds.com
sailacc.com
thewindgallery.com
elvinrisky.com
flowersassistedliving.com
lzbnwy.com
mrpentester.com
joinmytradingteam.com
jasabuatvisa.com
meherunnessa-foundation.com
notyourtypicaljocks.com
lobo-sports.com
nails-of-art.com
skinatoms.com
huadijc.com
elegantligting.com
zwasperr.com
401ne19thstapt51.com
semedburiti.com
andieweb.com
best20hookups.com
planttan.com
entrenamientoenequilibrio.com
newsecho.net
cocktailcrates.com
gurumedicalsupplies.com
legaca.trade
carscompetition.com
disloc.net
hsupi.com
s-sgasia.com
dictuse.xyz
vayocart.com
boxedhawaii.com
wateryourlandscape.com
countrytouring.com
shifamedico.com
gdhymc.com
sessionsup.com
viettellongxuyen.com
shindeconstruction.com
theautocareshop.com
maxwellgolf.com
hongdajunheng.com
mwakossolutions.com
fabulashpro.com
sklsdcollege.com
sensualblogs.com
gtainsinde.com
nehyam.com
itool.group
noblehare.com
amylaib.com
photosbylanie.com
palmoiltech.com
harrypotterwithguna.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1476-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1476-11-0x000000000041EBF0-mapping.dmp formbook behavioral1/memory/1348-20-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 748 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
W21_0191,pdf.exeW21_0191,pdf.exeraserver.exedescription pid process target process PID 292 set thread context of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 1476 set thread context of 1268 1476 W21_0191,pdf.exe Explorer.EXE PID 1348 set thread context of 1268 1348 raserver.exe Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
W21_0191,pdf.exeW21_0191,pdf.exeraserver.exepid process 292 W21_0191,pdf.exe 1476 W21_0191,pdf.exe 1476 W21_0191,pdf.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe 1348 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
W21_0191,pdf.exeraserver.exepid process 1476 W21_0191,pdf.exe 1476 W21_0191,pdf.exe 1476 W21_0191,pdf.exe 1348 raserver.exe 1348 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
W21_0191,pdf.exeW21_0191,pdf.exeraserver.exedescription pid process Token: SeDebugPrivilege 292 W21_0191,pdf.exe Token: SeDebugPrivilege 1476 W21_0191,pdf.exe Token: SeDebugPrivilege 1348 raserver.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
W21_0191,pdf.exeExplorer.EXEraserver.exedescription pid process target process PID 292 wrote to memory of 1696 292 W21_0191,pdf.exe schtasks.exe PID 292 wrote to memory of 1696 292 W21_0191,pdf.exe schtasks.exe PID 292 wrote to memory of 1696 292 W21_0191,pdf.exe schtasks.exe PID 292 wrote to memory of 1696 292 W21_0191,pdf.exe schtasks.exe PID 292 wrote to memory of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 292 wrote to memory of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 292 wrote to memory of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 292 wrote to memory of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 292 wrote to memory of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 292 wrote to memory of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 292 wrote to memory of 1476 292 W21_0191,pdf.exe W21_0191,pdf.exe PID 1268 wrote to memory of 1348 1268 Explorer.EXE raserver.exe PID 1268 wrote to memory of 1348 1268 Explorer.EXE raserver.exe PID 1268 wrote to memory of 1348 1268 Explorer.EXE raserver.exe PID 1268 wrote to memory of 1348 1268 Explorer.EXE raserver.exe PID 1348 wrote to memory of 748 1348 raserver.exe cmd.exe PID 1348 wrote to memory of 748 1348 raserver.exe cmd.exe PID 1348 wrote to memory of 748 1348 raserver.exe cmd.exe PID 1348 wrote to memory of 748 1348 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\W21_0191,pdf.exe"C:\Users\Admin\AppData\Local\Temp\W21_0191,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ErUoKVSz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp146B.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\W21_0191,pdf.exe"C:\Users\Admin\AppData\Local\Temp\W21_0191,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\W21_0191,pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp146B.tmpMD5
f842d5df58102070a80760827c8c095c
SHA13b95c81015bb4c737af4bd5d6d62ab80b0b07659
SHA256739ba2f1b0a83a80e3a73291187e770a7c69751836a4aa5e61291fbe31ed3adc
SHA512f103278be48736f014251d359ec28f67031246225772f63379573ebc44825ca42eb83926ff922d7b845e7e93c43872cc83fc630b11f859cdc126e9f09364014b
-
memory/292-3-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/292-5-0x00000000004C0000-0x00000000004E3000-memory.dmpFilesize
140KB
-
memory/292-6-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/292-7-0x00000000022E0000-0x0000000002346000-memory.dmpFilesize
408KB
-
memory/292-2-0x00000000748A0000-0x0000000074F8E000-memory.dmpFilesize
6.9MB
-
memory/748-18-0x0000000000000000-mapping.dmp
-
memory/1268-15-0x0000000007310000-0x000000000749B000-memory.dmpFilesize
1.5MB
-
memory/1348-16-0x0000000000000000-mapping.dmp
-
memory/1348-17-0x0000000076861000-0x0000000076863000-memory.dmpFilesize
8KB
-
memory/1348-19-0x00000000006E0000-0x00000000006FC000-memory.dmpFilesize
112KB
-
memory/1348-21-0x0000000002080000-0x0000000002383000-memory.dmpFilesize
3.0MB
-
memory/1348-20-0x0000000000080000-0x00000000000AE000-memory.dmpFilesize
184KB
-
memory/1348-22-0x0000000001EC0000-0x0000000001F53000-memory.dmpFilesize
588KB
-
memory/1476-13-0x0000000000A60000-0x0000000000D63000-memory.dmpFilesize
3.0MB
-
memory/1476-14-0x0000000000280000-0x0000000000294000-memory.dmpFilesize
80KB
-
memory/1476-11-0x000000000041EBF0-mapping.dmp
-
memory/1476-10-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1696-8-0x0000000000000000-mapping.dmp