Analysis
-
max time kernel
149s -
max time network
22s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-05-2021 05:40
Static task
static1
Behavioral task
behavioral1
Sample
0BX91W1MA.scr
Resource
win7v20210408
General
-
Target
0BX91W1MA.scr
-
Size
770KB
-
MD5
f39afbe1c85c716c173a20017b94319c
-
SHA1
56398ed8fab138969bfa478e28d82f77e0ecd463
-
SHA256
8f0337a6ceabb0f235950c20db817d766d4b9e5cf8831e60ef766c82f33f7dec
-
SHA512
bbdec959a7d3299d93a6ec77980b23625f52a002e0231cb095a71a870db2819aca0d60a9c1f0eec4b5f3656c92d252a61b6ae63fb914755dc8fe74b6eddd0de8
Malware Config
Extracted
formbook
4.1
http://www.evolvekitchendesign.com/ffw/
unmutedgenerations.com
localmoversuae.com
centralrea.com
geyyfphzoe.com
silverpackfactory.com
techtronixx.com
shop-deinen-deal.com
buehne.cloud
inspirefreedomtoday.com
chapelcouture.com
easton-taiwan.com
quanaonudep.store
merzigomusic.com
wpzoomin.com
service-lkytrsahdfpedf.com
yeasuc.com
mydogtrainingservice.com
galeribisnisonline.com
cscremodeling.com
bom-zzxx.com
ensobet88.com
vegancto.com
digivisiol.com
advancetools.net
gzqyjd.com
xtgnsl.com
ftfortmyers.com
g-siqueira.com
ufdzbhrxk.icu
tiekotiin.com
youschrutedit.com
takahatadenkikouji.com
goodfastco.com
jtelitetraining.com
planet-hype.com
gigwindow.com
levelxpr.com
besttechmobcomm.info
funneldesigngenie.com
mylisting.cloud
alltwoyou.com
mortgagesandprotection.online
monthlydigest.info
senlangdq.com
postphenomenon.com
slymwhite.com
masonpreschool.com
wahooshop.com
meridiangummies.com
samsungpartsdept.com
saludbellezaybienestar.net
vickifoxproductions.com
shawandwesson.info
nutrepele.com
gorillatanks.com
praktijkinfinity.online
lanteredam.com
refinedmanagement.com
tiwapay.com
fruitsinbeers.com
charliekay.net
realironart.com
sonsofmari.com
kedingtonni.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/552-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/552-67-0x000000000041EB50-mapping.dmp formbook behavioral1/memory/916-77-0x0000000000070000-0x000000000009E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
0BX91W1MA.scrdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0BX91W1MA.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0BX91W1MA.scr -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1556 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
0BX91W1MA.scrdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0BX91W1MA.scr Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0BX91W1MA.scr -
Suspicious use of SetThreadContext 4 IoCs
Processes:
0BX91W1MA.scr0BX91W1MA.scrcscript.exedescription pid process target process PID 344 set thread context of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 552 set thread context of 1180 552 0BX91W1MA.scr Explorer.EXE PID 552 set thread context of 1180 552 0BX91W1MA.scr Explorer.EXE PID 916 set thread context of 1180 916 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
0BX91W1MA.scrcscript.exepid process 552 0BX91W1MA.scr 552 0BX91W1MA.scr 552 0BX91W1MA.scr 916 cscript.exe 916 cscript.exe 916 cscript.exe 916 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
0BX91W1MA.scrcscript.exepid process 552 0BX91W1MA.scr 552 0BX91W1MA.scr 552 0BX91W1MA.scr 552 0BX91W1MA.scr 916 cscript.exe 916 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0BX91W1MA.scrcscript.exedescription pid process Token: SeDebugPrivilege 552 0BX91W1MA.scr Token: SeDebugPrivilege 916 cscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0BX91W1MA.scrExplorer.EXEcscript.exedescription pid process target process PID 344 wrote to memory of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 344 wrote to memory of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 344 wrote to memory of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 344 wrote to memory of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 344 wrote to memory of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 344 wrote to memory of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 344 wrote to memory of 552 344 0BX91W1MA.scr 0BX91W1MA.scr PID 1180 wrote to memory of 916 1180 Explorer.EXE cscript.exe PID 1180 wrote to memory of 916 1180 Explorer.EXE cscript.exe PID 1180 wrote to memory of 916 1180 Explorer.EXE cscript.exe PID 1180 wrote to memory of 916 1180 Explorer.EXE cscript.exe PID 916 wrote to memory of 1556 916 cscript.exe cmd.exe PID 916 wrote to memory of 1556 916 cscript.exe cmd.exe PID 916 wrote to memory of 1556 916 cscript.exe cmd.exe PID 916 wrote to memory of 1556 916 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\0BX91W1MA.scr"C:\Users\Admin\AppData\Local\Temp\0BX91W1MA.scr" /S2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Users\Admin\AppData\Local\Temp\0BX91W1MA.scr"C:\Users\Admin\AppData\Local\Temp\0BX91W1MA.scr"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\0BX91W1MA.scr"3⤵
- Deletes itself
PID:1556