Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-05-2021 04:45
Static task
static1
Behavioral task
behavioral1
Sample
akon.exe
Resource
win7v20210408
General
-
Target
akon.exe
-
Size
756KB
-
MD5
0690de55a2a4081dd2ebc1f658bba4da
-
SHA1
e4952f3e5cb0c877c682678dbee181a8c737df28
-
SHA256
8bb3e6cace7598576464639d7f88d0c4d55919b2e110a341df89a1569ae0d5b7
-
SHA512
94576e743a774e30fbe40053d06c3d4ad8c4c2e421297bcae108a780713da45bf24487a541fbb1b706d0855a69d6883b68f2ec06be9bd2032e72a77d96ecf5c9
Malware Config
Extracted
formbook
4.1
http://www.merifalls.com/4kx/
eufood.info
theprotestmatters.com
khauchakhajina.com
008usa-xxf.com
backriverroadsportsplex.com
shopalndrinks.com
necght.xyz
summaryborrow.info
mys518.com
shopapemodeapparel.com
christineroseartiste.com
rsw2226.com
ashes-of-creation.com
shamilalyadin.com
learning-synergy.com
sendstats.net
waverdemo.tech
dubestol.com
bolterbunny.com
beerciderrebattes.com
threecommaacademy.com
paramethica.com
datoule.com
premiumsigorta.com
rwtmn.com
afwzonz.icu
hugsnkissesstore.com
ibf-ldc.com
ivanorduna.com
muthermedusa.com
commotional.com
cedarhilldreams.com
safehavenislandhomes.com
bedandbreakfastinmexico.com
hackerxchange.net
thedandygator.com
qixing1.com
fandombee.com
c-realz.com
bioworks.today
htmlcsscolorcodes.com
charmscitycases.com
harvestsdata.com
estiloxstore.com
greenwichconstructions.com
yogadochmal.com
spireenergy.support
birdsofafeathersf.com
fusui123.com
jms788.com
khalitex.com
fygj.online
weddingplannerssanantonio.com
ourgariwerdstories.com
theprettyclicks.com
lashice.com
yingchunjiaoguan.com
fx-kinyu.site
sterlingoaksassistedliving.com
thrivedesk.net
tyltrol.com
baolehome.com
uhousenet.com
arneeverts.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1108-123-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1108-124-0x000000000041EAD0-mapping.dmp formbook behavioral2/memory/2148-132-0x0000000000870000-0x000000000089E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
akon.exeakon.exesvchost.exedescription pid process target process PID 3176 set thread context of 1108 3176 akon.exe akon.exe PID 1108 set thread context of 2984 1108 akon.exe Explorer.EXE PID 2148 set thread context of 2984 2148 svchost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
akon.exeakon.exesvchost.exepid process 3176 akon.exe 3176 akon.exe 1108 akon.exe 1108 akon.exe 1108 akon.exe 1108 akon.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
akon.exesvchost.exepid process 1108 akon.exe 1108 akon.exe 1108 akon.exe 2148 svchost.exe 2148 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
akon.exeakon.exesvchost.exedescription pid process Token: SeDebugPrivilege 3176 akon.exe Token: SeDebugPrivilege 1108 akon.exe Token: SeDebugPrivilege 2148 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
akon.exeExplorer.EXEsvchost.exedescription pid process target process PID 3176 wrote to memory of 1292 3176 akon.exe akon.exe PID 3176 wrote to memory of 1292 3176 akon.exe akon.exe PID 3176 wrote to memory of 1292 3176 akon.exe akon.exe PID 3176 wrote to memory of 1108 3176 akon.exe akon.exe PID 3176 wrote to memory of 1108 3176 akon.exe akon.exe PID 3176 wrote to memory of 1108 3176 akon.exe akon.exe PID 3176 wrote to memory of 1108 3176 akon.exe akon.exe PID 3176 wrote to memory of 1108 3176 akon.exe akon.exe PID 3176 wrote to memory of 1108 3176 akon.exe akon.exe PID 2984 wrote to memory of 2148 2984 Explorer.EXE svchost.exe PID 2984 wrote to memory of 2148 2984 Explorer.EXE svchost.exe PID 2984 wrote to memory of 2148 2984 Explorer.EXE svchost.exe PID 2148 wrote to memory of 3964 2148 svchost.exe cmd.exe PID 2148 wrote to memory of 3964 2148 svchost.exe cmd.exe PID 2148 wrote to memory of 3964 2148 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\akon.exe"C:\Users\Admin\AppData\Local\Temp\akon.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\akon.exe"C:\Users\Admin\AppData\Local\Temp\akon.exe"3⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\akon.exe"C:\Users\Admin\AppData\Local\Temp\akon.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\akon.exe"3⤵PID:3964
-
-