Analysis
-
max time kernel
40s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
20-01-2021 14:20
Static task
static1
Behavioral task
behavioral1
Sample
0490ab92aedecbbe4fe1ab000dff0410.exe
Resource
win7v20201028
General
-
Target
0490ab92aedecbbe4fe1ab000dff0410.exe
-
Size
1.4MB
-
MD5
0490ab92aedecbbe4fe1ab000dff0410
-
SHA1
1470aab30084ee6c1e1648c71e46606dfa774658
-
SHA256
3ce15be8f0a31d5fa5a176c3abb3729fd834a6af3e8a69b35cc6f2dd54c66fdb
-
SHA512
f020e253faa71652f1385cd8cce2afe79000950a36d8670d69f681fccc19b9f2a0d07abc69628f60e65cf46c88688e7ba189141a9a467230b7da242b7963b71d
Malware Config
Extracted
formbook
http://www.embracingmyjourney.net/p7t/
crosvudigital.com
airgreenllc.com
epochryphal.com
handy-domain-listing.com
espaceideecreation.com
3sleeves.com
alotrooms.com
luttelion.com
efekaleci.xyz
allpapas.com
alverazricardez.com
meghandoria.com
deicorp-community.com
877nz.com
bahmanhochmetalwerks.com
teppeisugaya.com
kitrablog.digital
theatermoviebuying.com
ptlycloudy.com
ablehed.pro
tolsecuremessagino.com
threepillarsofhealth.com
terrafirma-realty.com
ferreteriachiclana.com
badland-guns.com
emdidg.net
amazingchristianschool.com
delunmolding.com
laurencosiovocalstudio.com
ayrelon.com
serenderturizm.com
meet2night.site
lyoml.com
samarclinic.info
styvet.com
chriswoodgolf.com
htgginsure.com
bbvqcompass.com
reggielawfirm.com
graphix3dpromotions.com
surla.club
dlhexiang.com
awalkerfamilylaw.com
kingdofficial.online
qbluedotvrwd.com
porolonsamostroi.com
anametz.com
losrentablesdeoro.com
yax31.com
loudlocks.com
freisaq.com
digitalwalletsnews.com
mymaymotors.com
ecommerceeu.com
mtvoniline24.com
obluedotsmartshop.com
phantomgoat.com
dulcevazques.com
excession.network
abnehm-quiz.online
toyreel.com
kingdom-steel.com
grandmasalt.com
boykinspto.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/904-9-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/904-10-0x000000000041EBB0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0490ab92aedecbbe4fe1ab000dff0410.exedescription pid process target process PID 1012 set thread context of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
0490ab92aedecbbe4fe1ab000dff0410.exe0490ab92aedecbbe4fe1ab000dff0410.exepid process 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 904 0490ab92aedecbbe4fe1ab000dff0410.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0490ab92aedecbbe4fe1ab000dff0410.exedescription pid process Token: SeDebugPrivilege 1012 0490ab92aedecbbe4fe1ab000dff0410.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
0490ab92aedecbbe4fe1ab000dff0410.exedescription pid process target process PID 1012 wrote to memory of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe PID 1012 wrote to memory of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe PID 1012 wrote to memory of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe PID 1012 wrote to memory of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe PID 1012 wrote to memory of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe PID 1012 wrote to memory of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe PID 1012 wrote to memory of 904 1012 0490ab92aedecbbe4fe1ab000dff0410.exe 0490ab92aedecbbe4fe1ab000dff0410.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0490ab92aedecbbe4fe1ab000dff0410.exe"C:\Users\Admin\AppData\Local\Temp\0490ab92aedecbbe4fe1ab000dff0410.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0490ab92aedecbbe4fe1ab000dff0410.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/904-9-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/904-10-0x000000000041EBB0-mapping.dmp
-
memory/904-12-0x0000000000970000-0x0000000000C73000-memory.dmpFilesize
3.0MB
-
memory/1012-2-0x0000000074D20000-0x000000007540E000-memory.dmpFilesize
6.9MB
-
memory/1012-3-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/1012-5-0x0000000000460000-0x00000000004E9000-memory.dmpFilesize
548KB
-
memory/1012-6-0x0000000005D40000-0x0000000005D41000-memory.dmpFilesize
4KB
-
memory/1012-7-0x00000000003D0000-0x00000000003DE000-memory.dmpFilesize
56KB
-
memory/1012-8-0x0000000004900000-0x000000000494D000-memory.dmpFilesize
308KB