Analysis
-
max time kernel
150s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 17:53
Static task
static1
Behavioral task
behavioral1
Sample
Details...exe
Resource
win7v20201028
General
-
Target
Details...exe
-
Size
978KB
-
MD5
4784ea7aa126e562158fd9882a3f771e
-
SHA1
1e74531be148cd8ecea482b060836f1102cbb57b
-
SHA256
62e4e1e22348e0eb9b33c350ee4489a3d9292dd81bf289282ebb148507180609
-
SHA512
5b8ec648de68f613d104870e4b4e7a08c9d79a83ba3622ba4f00166ae16fa994f59e96ca5c732c76d0f553141590634a2443e26e8be359b172b7d06d254a8493
Malware Config
Extracted
formbook
http://www.deuxus.com/t052/
ladybug-learning.com
unforgottenstory.com
oldmopaiv.xyz
natashaexim.com
hannahmcelgunn.com
retargetingmachines.info
njoconline.com
unicornlankadelivery.com
giftkerala.com
englishfordoctors.online
schatzilandrvresort.com
brujoisaac.com
basiccampinggear.com
escapees.today
dgyxsy888.com
stevebana.xyz
mimozakebap.com
ezdoff.com
pluumyspalace.com
shaoshanshan.com
crazyvine.wine
sfjt55.com
xjgqh.com
netverificatie-home.info
efnew.com
welderweb.com
2ndstars.com
parrotpink.com
sarahjanehammock.com
pizzawestpalmbeach.com
pivot-branding.com
bribiebootcamp.com
floridaincontinencetherapy.com
muddanyc.com
pflegedienst-24-7.com
kunstradar.com
coolgadgetsdominate.com
comedynationlive.com
workoutandlawn.com
orangecountyvolvolease.com
sunrisemath.com
premiumenterprisegroup.com
mnglobalplatform.com
bijie.xyz
christiandailyusa.com
kismetestatestjohn.com
bobyworks.com
h2cooker.com
kimquint.com
torturechamberproductions.com
superbbsuper.com
bibleandkoran.net
oncuecollective.com
strat-fundamentals.info
taichi.chat
beautyroomgreenwich.com
686761.com
prostatamrt.net
medicina-genomica.com
hl022.com
forestlawnfunerals.com
charismayachts.com
sublimequalitystore.com
bowvacare.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1512-8-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1512-9-0x000000000041ECC0-mapping.dmp formbook behavioral1/memory/328-17-0x0000000000090000-0x00000000000BE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 112 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Details...exeDetails...execmstp.exedescription pid process target process PID 1064 set thread context of 1512 1064 Details...exe Details...exe PID 1512 set thread context of 1220 1512 Details...exe Explorer.EXE PID 328 set thread context of 1220 328 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Details...execmstp.exepid process 1512 Details...exe 1512 Details...exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe 328 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Details...execmstp.exepid process 1512 Details...exe 1512 Details...exe 1512 Details...exe 328 cmstp.exe 328 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Details...exeDetails...execmstp.exedescription pid process Token: SeDebugPrivilege 1064 Details...exe Token: SeDebugPrivilege 1512 Details...exe Token: SeDebugPrivilege 328 cmstp.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Details...exeExplorer.EXEcmstp.exedescription pid process target process PID 1064 wrote to memory of 1512 1064 Details...exe Details...exe PID 1064 wrote to memory of 1512 1064 Details...exe Details...exe PID 1064 wrote to memory of 1512 1064 Details...exe Details...exe PID 1064 wrote to memory of 1512 1064 Details...exe Details...exe PID 1064 wrote to memory of 1512 1064 Details...exe Details...exe PID 1064 wrote to memory of 1512 1064 Details...exe Details...exe PID 1064 wrote to memory of 1512 1064 Details...exe Details...exe PID 1220 wrote to memory of 328 1220 Explorer.EXE cmstp.exe PID 1220 wrote to memory of 328 1220 Explorer.EXE cmstp.exe PID 1220 wrote to memory of 328 1220 Explorer.EXE cmstp.exe PID 1220 wrote to memory of 328 1220 Explorer.EXE cmstp.exe PID 1220 wrote to memory of 328 1220 Explorer.EXE cmstp.exe PID 1220 wrote to memory of 328 1220 Explorer.EXE cmstp.exe PID 1220 wrote to memory of 328 1220 Explorer.EXE cmstp.exe PID 328 wrote to memory of 112 328 cmstp.exe cmd.exe PID 328 wrote to memory of 112 328 cmstp.exe cmd.exe PID 328 wrote to memory of 112 328 cmstp.exe cmd.exe PID 328 wrote to memory of 112 328 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Details...exe"C:\Users\Admin\AppData\Local\Temp\Details...exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Details...exe"C:\Users\Admin\AppData\Local\Temp\Details...exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Details...exe"3⤵
- Deletes itself
PID:112