Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-05-2021 02:01
Static task
static1
Behavioral task
behavioral1
Sample
MSUtbPjUGib2dvd.exe
Resource
win7v20210408
General
-
Target
MSUtbPjUGib2dvd.exe
-
Size
733KB
-
MD5
2f7f29fe69e0b9bcd41c069689fd9cb5
-
SHA1
eacd339fda8902c242a9831dac733ac4ef77d1ee
-
SHA256
82a09751c8b51a1dc0aca4780015f833a2ef01ff6d3d5f2d98dcd588381bec82
-
SHA512
3becde1b46a4f640899bd4286fb0ba892e4cfe24a3c4c2c1b6975628ad71f75abaceedde64f1e0d870f2224236287875bd8f394cfe362cb2bca7b7a9ee712f1f
Malware Config
Extracted
formbook
4.1
http://www.zmuoxb.com/ffy/
kundk-gebaeudemanagement.com
theeconomicalmillennial.com
bigbuttdating.net
dauthomdubai.com
thesilverslipper.club
onwardmotionpictures.com
tl2009.com
nelivo.com
valuablebet.com
kupiokno-online.com
magnoot.xyz
blandiskodk.com
thevibes.net
tp-simogame.com
cigarettes-on-line.com
radiancebyreilly.com
1mame.net
fimimarket.com
cayupi.com
transperucorp.com
mepocamusic.com
chaletpetille.com
apagyms.com
lindawattssilvapt.com
coffeeupgraded.com
linkedina-z.com
fangxiaotan.com
bigalswildadventures.com
bankoftheberkshires.com
summiterhub.com
7955t.com
bolnewshelpline.com
mariachisaborajalisco.com
theinterlaced.com
458stovall.com
xzgeermu.com
ibfscmy.icu
pubgfret.com
cricketsofa.com
ryancavellong.com
panafricanholdings.com
ecometrical.com
ukrainian-and-latin-cuisine.com
synklion.com
novitadelgiorno.com
evfurniture.com
river-side.net
cornershoppie.com
oneisawholenumber.com
randombakes.com
metropolitan-inmobilia.com
flifefusion.com
extravagantmagazine.com
janedoeone.com
lolitamicgiyim.com
trendingmaroc.com
hansebauunternehmen.com
trishimpex.com
vibronguitars.com
touchofblack.net
madeinlimestonecounty.com
shetalksrecipes.com
flpdelperu.com
gpjlqwnd.icu
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/268-65-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/268-66-0x000000000041EB80-mapping.dmp formbook behavioral1/memory/1768-74-0x0000000000070000-0x000000000009E000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1812 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
MSUtbPjUGib2dvd.exeMSUtbPjUGib2dvd.exewscript.exedescription pid process target process PID 1632 set thread context of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 268 set thread context of 1244 268 MSUtbPjUGib2dvd.exe Explorer.EXE PID 1768 set thread context of 1244 1768 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
MSUtbPjUGib2dvd.exewscript.exepid process 268 MSUtbPjUGib2dvd.exe 268 MSUtbPjUGib2dvd.exe 1768 wscript.exe 1768 wscript.exe 1768 wscript.exe 1768 wscript.exe 1768 wscript.exe 1768 wscript.exe 1768 wscript.exe 1768 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
MSUtbPjUGib2dvd.exewscript.exepid process 268 MSUtbPjUGib2dvd.exe 268 MSUtbPjUGib2dvd.exe 268 MSUtbPjUGib2dvd.exe 1768 wscript.exe 1768 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MSUtbPjUGib2dvd.exewscript.exedescription pid process Token: SeDebugPrivilege 268 MSUtbPjUGib2dvd.exe Token: SeDebugPrivilege 1768 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
MSUtbPjUGib2dvd.exeExplorer.EXEwscript.exedescription pid process target process PID 1632 wrote to memory of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 1632 wrote to memory of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 1632 wrote to memory of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 1632 wrote to memory of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 1632 wrote to memory of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 1632 wrote to memory of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 1632 wrote to memory of 268 1632 MSUtbPjUGib2dvd.exe MSUtbPjUGib2dvd.exe PID 1244 wrote to memory of 1768 1244 Explorer.EXE wscript.exe PID 1244 wrote to memory of 1768 1244 Explorer.EXE wscript.exe PID 1244 wrote to memory of 1768 1244 Explorer.EXE wscript.exe PID 1244 wrote to memory of 1768 1244 Explorer.EXE wscript.exe PID 1768 wrote to memory of 1812 1768 wscript.exe cmd.exe PID 1768 wrote to memory of 1812 1768 wscript.exe cmd.exe PID 1768 wrote to memory of 1812 1768 wscript.exe cmd.exe PID 1768 wrote to memory of 1812 1768 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\MSUtbPjUGib2dvd.exe"C:\Users\Admin\AppData\Local\Temp\MSUtbPjUGib2dvd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\MSUtbPjUGib2dvd.exe"C:\Users\Admin\AppData\Local\Temp\MSUtbPjUGib2dvd.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:268 -
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:572
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MSUtbPjUGib2dvd.exe"3⤵
- Deletes itself
PID:1812