Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 07:55
Static task
static1
Behavioral task
behavioral1
Sample
PO-23562#TZ232-DATED19-01-2021.exe
Resource
win7v20201028
General
-
Target
PO-23562#TZ232-DATED19-01-2021.exe
-
Size
1.5MB
-
MD5
497a3aba71e4db2cbf7d3746acff93eb
-
SHA1
2e5a0391fd8024bec52d70d10356caa198c79f64
-
SHA256
2ba03179153cd1efd2098bf6fc7870efb2b3a5a60f2b516c4c3dace977627289
-
SHA512
19d819b0809af869a06a8ae2e700135208000b02bc269849aa21bbe94b90ac6fc87e647f0efaf6a58c558bcc143f4fe3c033059f2480182774978410655f5f18
Malware Config
Extracted
formbook
http://www.styrelseforum.com/p95n/
kimberlyrutledge.com
auctus.agency
johnemotions.com
guilt-brilliant.com
wxshangdian.com
theolivetreeonline.com
stellarfranchisebrands.com
every1no1.com
hoangthanhgroup.com
psm-gen.com
kingdomwow.com
digitalksr.com
karynpolitoforlg.com
youthdaycalgary.com
libertyhandymanservicesllc.com
breatheohio.com
allenleather.com
transformafter50.info
hnhsylsb.com
hmtradebd.com
besrhodislandhomes.com
zuwozo.com
southernhighlandsnails.com
kaaxg.com
bauer-cobolt.com
steelyourselfshop.net
linksoflondoncharmscheap.com
groundwork-pt.com
beautifulangelicskin.com
aduhelmfinancialsupport.com
xn--carpinteratarifa-hsb.com
thekingink.net
ocotegrill.com
gilbertdodge.com
insuranceinquirer.com
withagentcy.com
deeparchivesvpn.com
blamekd.com
acsdealta.xyz
dsxcj.com
kimonoshihan.com
bosquefamily.com
5587sk.com
integrative.life
unitedjournal.info
lynxdeck.com
onlyfanyou.com
aminomedicalscience.com
rachenstern-technik.com
thejewelrybox.net
stopcolleges.com
thesaltlifestyle.com
tappesupportservices.com
andrewgreenhomes.com
meidiansc.com
gobalexporter.com
rvpji571m.xyz
alwekalaaladabeya.com
scientificimaginetics.com
skaizenpharma.com
balloonpost.club
thefunnythingabout.com
premium-vitality.com
businesscalmcoaching.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2176-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2176-14-0x000000000041EDF0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO-23562#TZ232-DATED19-01-2021.exedescription pid process target process PID 580 set thread context of 2176 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
PO-23562#TZ232-DATED19-01-2021.exePO-23562#TZ232-DATED19-01-2021.exepid process 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 580 PO-23562#TZ232-DATED19-01-2021.exe 2176 PO-23562#TZ232-DATED19-01-2021.exe 2176 PO-23562#TZ232-DATED19-01-2021.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PO-23562#TZ232-DATED19-01-2021.exedescription pid process Token: SeDebugPrivilege 580 PO-23562#TZ232-DATED19-01-2021.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PO-23562#TZ232-DATED19-01-2021.exedescription pid process target process PID 580 wrote to memory of 3832 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 3832 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 3832 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 932 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 932 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 932 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2312 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2312 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2312 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2176 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2176 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2176 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2176 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2176 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe PID 580 wrote to memory of 2176 580 PO-23562#TZ232-DATED19-01-2021.exe PO-23562#TZ232-DATED19-01-2021.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232-DATED19-01-2021.exe"C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232-DATED19-01-2021.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232-DATED19-01-2021.exe"{path}"2⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232-DATED19-01-2021.exe"{path}"2⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232-DATED19-01-2021.exe"{path}"2⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232-DATED19-01-2021.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176