Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-04-2021 06:55
Static task
static1
Behavioral task
behavioral1
Sample
PO#560.zip.exe
Resource
win7v20201028
General
-
Target
PO#560.zip.exe
-
Size
913KB
-
MD5
225f5938273f006356fd813e46e3fcef
-
SHA1
347cd34fd095ae8f843ee436dde5043bba8fb192
-
SHA256
69a395d24a3536ef7698ae036596bed55856d4777356946f498faec3f1395f8d
-
SHA512
a6b9d13ea56e7e22abb484de6c4d5b53b7dc645e23327c9b45d20ce872408d3a9c9c93bdf540e39dd3c4a0206f7fc5008edff5787fad1b2674ebe3e060bbfb9c
Malware Config
Extracted
formbook
4.1
http://www.talllensphotography.com/md5/
gnd3.com
thedrata.com
carbeloy.com
impactpittsburg.com
sussage.com
mikespencil.com
ghoshtechno.com
partnermassagetherapy.com
nagago.asia
parkviee.com
kichisanpo.com
awbaviation.com
shopvibeup.com
ab-alamode.com
cash4homesutah.com
funbrushstrokes.com
adeleycar.com
actsbooking.com
rojorodi.icu
fleurdelyscantho.com
bobwhiteknives.com
entrefloresdr.com
eurostarcellars.com
shipu143.com
lindsaydrees.com
turningtecc.com
reusedearth.com
theemperorbrand.com
afrohiphops.com
officehoursonly.com
pharmacistscbd.com
yaanpay.com
mymoxypets.com
sharehealthalliance.com
sparktvnetwork.com
marymoorridgecondo.com
honest-woman.com
blitzerfoto.net
vanhanhnhansu.com
lawyerspledge.com
parkwashingtondc.com
worldwideexpressweb.net
oatml.com
acquaintancenutritious.info
lukmanmalik.xyz
eudorabcantik.com
fotosdepueblo.com
latelierp.com
dogmomtreats.com
beerthirtyslc.com
greenlightsmokables.com
newyorkbusinesssolutions.com
latravesia.net
worldvisioncompany.com
radiusbrisbane.com
beachhammocking.com
games-daizo.com
customkreation.com
universiteyehazirlan.com
studentpalace.rentals
vizecix.com
new123movies.pro
skincolored.com
goldstespresso.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2940-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2940-14-0x000000000041EBA0-mapping.dmp formbook behavioral2/memory/3464-21-0x0000000002C70000-0x0000000002C9E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO#560.zip.exePO#560.zip.exerundll32.exedescription pid process target process PID 652 set thread context of 2940 652 PO#560.zip.exe PO#560.zip.exe PID 2940 set thread context of 3028 2940 PO#560.zip.exe Explorer.EXE PID 3464 set thread context of 3028 3464 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
PO#560.zip.exePO#560.zip.exerundll32.exepid process 652 PO#560.zip.exe 2940 PO#560.zip.exe 2940 PO#560.zip.exe 2940 PO#560.zip.exe 2940 PO#560.zip.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe 3464 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PO#560.zip.exerundll32.exepid process 2940 PO#560.zip.exe 2940 PO#560.zip.exe 2940 PO#560.zip.exe 3464 rundll32.exe 3464 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO#560.zip.exePO#560.zip.exerundll32.exedescription pid process Token: SeDebugPrivilege 652 PO#560.zip.exe Token: SeDebugPrivilege 2940 PO#560.zip.exe Token: SeDebugPrivilege 3464 rundll32.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3028 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PO#560.zip.exeExplorer.EXErundll32.exedescription pid process target process PID 652 wrote to memory of 2940 652 PO#560.zip.exe PO#560.zip.exe PID 652 wrote to memory of 2940 652 PO#560.zip.exe PO#560.zip.exe PID 652 wrote to memory of 2940 652 PO#560.zip.exe PO#560.zip.exe PID 652 wrote to memory of 2940 652 PO#560.zip.exe PO#560.zip.exe PID 652 wrote to memory of 2940 652 PO#560.zip.exe PO#560.zip.exe PID 652 wrote to memory of 2940 652 PO#560.zip.exe PO#560.zip.exe PID 3028 wrote to memory of 3464 3028 Explorer.EXE rundll32.exe PID 3028 wrote to memory of 3464 3028 Explorer.EXE rundll32.exe PID 3028 wrote to memory of 3464 3028 Explorer.EXE rundll32.exe PID 3464 wrote to memory of 1300 3464 rundll32.exe cmd.exe PID 3464 wrote to memory of 1300 3464 rundll32.exe cmd.exe PID 3464 wrote to memory of 1300 3464 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO#560.zip.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/652-3-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/652-5-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/652-6-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/652-7-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/652-8-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/652-9-0x0000000007430000-0x0000000007431000-memory.dmpFilesize
4KB
-
memory/652-10-0x0000000005400000-0x0000000005405000-memory.dmpFilesize
20KB
-
memory/652-11-0x0000000008760000-0x0000000008811000-memory.dmpFilesize
708KB
-
memory/652-12-0x0000000006C30000-0x0000000006C97000-memory.dmpFilesize
412KB
-
memory/652-2-0x0000000073DC0000-0x00000000744AE000-memory.dmpFilesize
6.9MB
-
memory/1300-22-0x0000000000000000-mapping.dmp
-
memory/2940-13-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2940-17-0x00000000015B0000-0x00000000015C4000-memory.dmpFilesize
80KB
-
memory/2940-16-0x0000000001670000-0x0000000001990000-memory.dmpFilesize
3.1MB
-
memory/2940-14-0x000000000041EBA0-mapping.dmp
-
memory/3028-18-0x0000000005F00000-0x0000000006099000-memory.dmpFilesize
1.6MB
-
memory/3028-25-0x0000000006600000-0x000000000674F000-memory.dmpFilesize
1.3MB
-
memory/3464-19-0x0000000000000000-mapping.dmp
-
memory/3464-20-0x0000000000970000-0x0000000000983000-memory.dmpFilesize
76KB
-
memory/3464-21-0x0000000002C70000-0x0000000002C9E000-memory.dmpFilesize
184KB
-
memory/3464-23-0x0000000004AC0000-0x0000000004DE0000-memory.dmpFilesize
3.1MB
-
memory/3464-24-0x0000000004A20000-0x0000000004AB3000-memory.dmpFilesize
588KB