Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-05-2021 08:09
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7v20210408
General
-
Target
Quotation.exe
-
Size
955KB
-
MD5
9246a29da060479960879de3db2f1374
-
SHA1
fecbed5c0e6cce40444994c85caf7cb838b35df7
-
SHA256
49a4412c27e5eafc4c4365a2b2aeb962d6bf25849ab58d4e7eeb25fcfb934dcd
-
SHA512
d463a62e867e1b64e1a0fa22583840f6198b8af9e7cafbf6608da726fb94d66184c5abf172c150513a48ea09711633847e429b50bd3d0df09f5168799c640d7f
Malware Config
Extracted
formbook
4.1
http://www.bluesmartsockets.com/mgl/
credittipswebinar.com
pewpewlab.com
teamcreativconsultanting.com
bsf.xyz
youthwork.support
fmoues.com
ourcardoctor.com
wwwmoticarshub.net
bellevuedogroomer.com
vorazshop.com
sorteo.gratis
shalinihome.xyz
myschoolmgt.net
we73theunityprojectband.com
xn--n8jx07hkhe20b9k751g.com
gregrunnebaum.com
asnomayritys.com
iremgulmez.com
the1099guy.com
reviewscandy.net
reliableservicing.net
flowerscarpet.com
farmacyaustralia.com
chaytel.com
tslcreativearts.com
leather-metal.com
nella2matteo.com
amazingcoffee.club
rideonrenlo.com
pgmbin.com
handymanfromusa.com
medicalproductanimator.com
slmgtq.com
leamuratingles.com
funservicesfl.com
hyundaipartsdealsucks.com
edsportin.com
squeaser.com
freshdogsfood.com
myladylavish.com
redsofa.info
a5cdags-b.com
wrkan.com
globalindocctv.com
teacherdooley.com
chenzhixue.com
rupyamall.com
511hao.com
doncoolgadget.com
patientconnectmd.com
genupath.com
addarmy.com
ethanandmaddie2020.com
growthmediampn.com
thesocialgreen.com
mannersflaps.store
younisvisa.com
84483667.com
ironcountryllc.com
organbuy.com
superbmanshop.com
ultimatewellnesspro.com
iishon07.com
radkidsco.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3492-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3492-125-0x000000000041EB20-mapping.dmp formbook behavioral2/memory/3492-130-0x00000000015A0000-0x00000000016EA000-memory.dmp formbook behavioral2/memory/3968-134-0x0000000000CB0000-0x0000000000CDE000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Quotation.exeQuotation.exechkdsk.exedescription pid process target process PID 1016 set thread context of 3492 1016 Quotation.exe Quotation.exe PID 3492 set thread context of 2888 3492 Quotation.exe Explorer.EXE PID 3492 set thread context of 2888 3492 Quotation.exe Explorer.EXE PID 3968 set thread context of 2888 3968 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
Quotation.exeQuotation.exechkdsk.exepid process 1016 Quotation.exe 1016 Quotation.exe 1016 Quotation.exe 3492 Quotation.exe 3492 Quotation.exe 3492 Quotation.exe 3492 Quotation.exe 3492 Quotation.exe 3492 Quotation.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe 3968 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2888 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Quotation.exechkdsk.exepid process 3492 Quotation.exe 3492 Quotation.exe 3492 Quotation.exe 3492 Quotation.exe 3968 chkdsk.exe 3968 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Quotation.exeQuotation.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1016 Quotation.exe Token: SeDebugPrivilege 3492 Quotation.exe Token: SeDebugPrivilege 3968 chkdsk.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2888 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Quotation.exeExplorer.EXEchkdsk.exedescription pid process target process PID 1016 wrote to memory of 3492 1016 Quotation.exe Quotation.exe PID 1016 wrote to memory of 3492 1016 Quotation.exe Quotation.exe PID 1016 wrote to memory of 3492 1016 Quotation.exe Quotation.exe PID 1016 wrote to memory of 3492 1016 Quotation.exe Quotation.exe PID 1016 wrote to memory of 3492 1016 Quotation.exe Quotation.exe PID 1016 wrote to memory of 3492 1016 Quotation.exe Quotation.exe PID 2888 wrote to memory of 3968 2888 Explorer.EXE chkdsk.exe PID 2888 wrote to memory of 3968 2888 Explorer.EXE chkdsk.exe PID 2888 wrote to memory of 3968 2888 Explorer.EXE chkdsk.exe PID 3968 wrote to memory of 3848 3968 chkdsk.exe cmd.exe PID 3968 wrote to memory of 3848 3968 chkdsk.exe cmd.exe PID 3968 wrote to memory of 3848 3968 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵PID:3848
-
-