Analysis
-
max time kernel
146s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-04-2021 06:55
Static task
static1
Behavioral task
behavioral1
Sample
PO#560.zip.exe
Resource
win7v20201028
General
-
Target
PO#560.zip.exe
-
Size
913KB
-
MD5
225f5938273f006356fd813e46e3fcef
-
SHA1
347cd34fd095ae8f843ee436dde5043bba8fb192
-
SHA256
69a395d24a3536ef7698ae036596bed55856d4777356946f498faec3f1395f8d
-
SHA512
a6b9d13ea56e7e22abb484de6c4d5b53b7dc645e23327c9b45d20ce872408d3a9c9c93bdf540e39dd3c4a0206f7fc5008edff5787fad1b2674ebe3e060bbfb9c
Malware Config
Extracted
formbook
4.1
http://www.talllensphotography.com/md5/
gnd3.com
thedrata.com
carbeloy.com
impactpittsburg.com
sussage.com
mikespencil.com
ghoshtechno.com
partnermassagetherapy.com
nagago.asia
parkviee.com
kichisanpo.com
awbaviation.com
shopvibeup.com
ab-alamode.com
cash4homesutah.com
funbrushstrokes.com
adeleycar.com
actsbooking.com
rojorodi.icu
fleurdelyscantho.com
bobwhiteknives.com
entrefloresdr.com
eurostarcellars.com
shipu143.com
lindsaydrees.com
turningtecc.com
reusedearth.com
theemperorbrand.com
afrohiphops.com
officehoursonly.com
pharmacistscbd.com
yaanpay.com
mymoxypets.com
sharehealthalliance.com
sparktvnetwork.com
marymoorridgecondo.com
honest-woman.com
blitzerfoto.net
vanhanhnhansu.com
lawyerspledge.com
parkwashingtondc.com
worldwideexpressweb.net
oatml.com
acquaintancenutritious.info
lukmanmalik.xyz
eudorabcantik.com
fotosdepueblo.com
latelierp.com
dogmomtreats.com
beerthirtyslc.com
greenlightsmokables.com
newyorkbusinesssolutions.com
latravesia.net
worldvisioncompany.com
radiusbrisbane.com
beachhammocking.com
games-daizo.com
customkreation.com
universiteyehazirlan.com
studentpalace.rentals
vizecix.com
new123movies.pro
skincolored.com
goldstespresso.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1896-9-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1896-10-0x000000000041EBA0-mapping.dmp formbook behavioral1/memory/928-19-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1476 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
PO#560.zip.exePO#560.zip.exewlanext.exedescription pid process target process PID 2004 set thread context of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 1896 set thread context of 1248 1896 PO#560.zip.exe Explorer.EXE PID 1896 set thread context of 1248 1896 PO#560.zip.exe Explorer.EXE PID 928 set thread context of 1248 928 wlanext.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
PO#560.zip.exePO#560.zip.exewlanext.exepid process 2004 PO#560.zip.exe 2004 PO#560.zip.exe 2004 PO#560.zip.exe 1896 PO#560.zip.exe 1896 PO#560.zip.exe 1896 PO#560.zip.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe 928 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
PO#560.zip.exewlanext.exepid process 1896 PO#560.zip.exe 1896 PO#560.zip.exe 1896 PO#560.zip.exe 1896 PO#560.zip.exe 928 wlanext.exe 928 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO#560.zip.exePO#560.zip.exewlanext.exedescription pid process Token: SeDebugPrivilege 2004 PO#560.zip.exe Token: SeDebugPrivilege 1896 PO#560.zip.exe Token: SeDebugPrivilege 928 wlanext.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
PO#560.zip.exeExplorer.EXEwlanext.exedescription pid process target process PID 2004 wrote to memory of 1608 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1608 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1608 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1608 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 2004 wrote to memory of 1896 2004 PO#560.zip.exe PO#560.zip.exe PID 1248 wrote to memory of 928 1248 Explorer.EXE wlanext.exe PID 1248 wrote to memory of 928 1248 Explorer.EXE wlanext.exe PID 1248 wrote to memory of 928 1248 Explorer.EXE wlanext.exe PID 1248 wrote to memory of 928 1248 Explorer.EXE wlanext.exe PID 928 wrote to memory of 1476 928 wlanext.exe cmd.exe PID 928 wrote to memory of 1476 928 wlanext.exe cmd.exe PID 928 wrote to memory of 1476 928 wlanext.exe cmd.exe PID 928 wrote to memory of 1476 928 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"{path}"3⤵
-
C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/928-22-0x0000000001DC0000-0x0000000001E53000-memory.dmpFilesize
588KB
-
memory/928-21-0x0000000001F00000-0x0000000002203000-memory.dmpFilesize
3.0MB
-
memory/928-19-0x0000000000080000-0x00000000000AE000-memory.dmpFilesize
184KB
-
memory/928-18-0x0000000000210000-0x0000000000226000-memory.dmpFilesize
88KB
-
memory/928-17-0x0000000000000000-mapping.dmp
-
memory/1248-14-0x0000000004F30000-0x0000000005001000-memory.dmpFilesize
836KB
-
memory/1248-16-0x0000000007220000-0x0000000007390000-memory.dmpFilesize
1.4MB
-
memory/1476-20-0x0000000000000000-mapping.dmp
-
memory/1896-12-0x00000000008F0000-0x0000000000BF3000-memory.dmpFilesize
3.0MB
-
memory/1896-13-0x0000000000140000-0x0000000000154000-memory.dmpFilesize
80KB
-
memory/1896-15-0x0000000000270000-0x0000000000284000-memory.dmpFilesize
80KB
-
memory/1896-10-0x000000000041EBA0-mapping.dmp
-
memory/1896-9-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2004-2-0x0000000074BA0000-0x000000007528E000-memory.dmpFilesize
6.9MB
-
memory/2004-8-0x00000000006D0000-0x0000000000737000-memory.dmpFilesize
412KB
-
memory/2004-7-0x0000000005370000-0x0000000005421000-memory.dmpFilesize
708KB
-
memory/2004-6-0x00000000004C0000-0x00000000004C5000-memory.dmpFilesize
20KB
-
memory/2004-5-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/2004-3-0x0000000000EF0000-0x0000000000EF1000-memory.dmpFilesize
4KB