Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-04-2021 06:29
Static task
static1
Behavioral task
behavioral1
Sample
IMG_9539483238436245,jpg.exe
Resource
win7v20210408
General
-
Target
IMG_9539483238436245,jpg.exe
-
Size
912KB
-
MD5
cb68abaabc06c778c17c75739d46f49c
-
SHA1
4001f18d286f239b11894d70a4e223ddf789c465
-
SHA256
b9ec25f02746e41791c31aa20c281f9a490a999962853f4b5122e94fb2f1aec2
-
SHA512
43ccee3402df74e05a45b510d5f82ed6206fefb08e93c8bc1f6e2bac29cf23ddd472ff35e9ab5e6f3bdcbf93be13218420993f9dbe06d93ca06652a721a83bfd
Malware Config
Extracted
formbook
4.1
http://www.supinapp.com/grv/
morganofatlanta.com
vz473.com
hengetelt.com
bailcally.com
virtuosoonline.com
tenthousandli.com
ohanamascota.com
digi-plates.com
prismagtech.com
we-cinema.com
372680.com
smartautoexpert.xyz
mrxzg.com
apartment-brussels.com
reverseincubator.com
linkasean.com
yummicrabva.com
diguchaye.com
reaktorfatura.com
thecatsaysno.com
mpgcommunications.net
lindustrieetleca.com
seosansar.com
alohalily.com
novergi.com
universityincanada.info
atrocity.xyz
johnsonballoonblessings.com
laurelmcintosh.com
nubedepalabras.com
ycmath.com
daveysdestinations.com
yourgutterguru.com
mayas.website
bessgarments.com
xhegu.com
mybusinessdoor.com
vivaceactivewear.com
nongyan.net
tgi-mail.net
j999a.com
slteka.com
pikipikiit.com
as0594.com
insuremydriverslicense.com
kclundsblades.com
haircleanerpro.com
charlesnwahiwe.com
ervoth.com
authentiekinnovations.com
molvmg.icu
xn--k1abtc6be.xn--p1acf
arm-srl.com
hood2healer.com
austinchapter7.com
clarityentct.com
bryllaw.com
twinworksllc.com
top-trend.website
rueschlink.com
oogilab.com
thewritersbookshelf.com
jademarkproducts.com
400city.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3872-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3872-126-0x000000000041EC20-mapping.dmp formbook behavioral2/memory/1712-133-0x0000000002B70000-0x0000000002B9E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
IMG_9539483238436245,jpg.exeIMG_9539483238436245,jpg.execolorcpl.exedescription pid process target process PID 4020 set thread context of 3872 4020 IMG_9539483238436245,jpg.exe IMG_9539483238436245,jpg.exe PID 3872 set thread context of 3064 3872 IMG_9539483238436245,jpg.exe Explorer.EXE PID 1712 set thread context of 3064 1712 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
IMG_9539483238436245,jpg.exeIMG_9539483238436245,jpg.execolorcpl.exepid process 4020 IMG_9539483238436245,jpg.exe 4020 IMG_9539483238436245,jpg.exe 4020 IMG_9539483238436245,jpg.exe 3872 IMG_9539483238436245,jpg.exe 3872 IMG_9539483238436245,jpg.exe 3872 IMG_9539483238436245,jpg.exe 3872 IMG_9539483238436245,jpg.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
IMG_9539483238436245,jpg.execolorcpl.exepid process 3872 IMG_9539483238436245,jpg.exe 3872 IMG_9539483238436245,jpg.exe 3872 IMG_9539483238436245,jpg.exe 1712 colorcpl.exe 1712 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
IMG_9539483238436245,jpg.exeIMG_9539483238436245,jpg.execolorcpl.exedescription pid process Token: SeDebugPrivilege 4020 IMG_9539483238436245,jpg.exe Token: SeDebugPrivilege 3872 IMG_9539483238436245,jpg.exe Token: SeDebugPrivilege 1712 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
IMG_9539483238436245,jpg.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 4020 wrote to memory of 3872 4020 IMG_9539483238436245,jpg.exe IMG_9539483238436245,jpg.exe PID 4020 wrote to memory of 3872 4020 IMG_9539483238436245,jpg.exe IMG_9539483238436245,jpg.exe PID 4020 wrote to memory of 3872 4020 IMG_9539483238436245,jpg.exe IMG_9539483238436245,jpg.exe PID 4020 wrote to memory of 3872 4020 IMG_9539483238436245,jpg.exe IMG_9539483238436245,jpg.exe PID 4020 wrote to memory of 3872 4020 IMG_9539483238436245,jpg.exe IMG_9539483238436245,jpg.exe PID 4020 wrote to memory of 3872 4020 IMG_9539483238436245,jpg.exe IMG_9539483238436245,jpg.exe PID 3064 wrote to memory of 1712 3064 Explorer.EXE colorcpl.exe PID 3064 wrote to memory of 1712 3064 Explorer.EXE colorcpl.exe PID 3064 wrote to memory of 1712 3064 Explorer.EXE colorcpl.exe PID 1712 wrote to memory of 3828 1712 colorcpl.exe cmd.exe PID 1712 wrote to memory of 3828 1712 colorcpl.exe cmd.exe PID 1712 wrote to memory of 3828 1712 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IMG_9539483238436245,jpg.exe"C:\Users\Admin\AppData\Local\Temp\IMG_9539483238436245,jpg.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\IMG_9539483238436245,jpg.exe"C:\Users\Admin\AppData\Local\Temp\IMG_9539483238436245,jpg.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IMG_9539483238436245,jpg.exe"3⤵PID:3828
-
-