Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
10-05-2021 19:02
Static task
static1
Behavioral task
behavioral1
Sample
PL_106104.exe
Resource
win7v20210410
General
-
Target
PL_106104.exe
-
Size
503KB
-
MD5
77f1784fa00332d5623aba88277eb8c1
-
SHA1
248f8ad49c0d3ef5ddbfaa5a8721aa4dc08acdf5
-
SHA256
7515beb02e1280d143b4716f8919e34fadfc7c806e5a354dc3dcd1dd3318882c
-
SHA512
28e6d83ed4f71557ad2d6a8c026d4ce57082cc95517aae0f7243aafc3edd5f1db70778a290b62f433fb4a5d31d3d8c9c8f119d45f9e01b8a0d6343e7a3e077c7
Malware Config
Extracted
formbook
4.1
http://www.cornerstonerecruitmentasia.com/nke/
igroomed.com
teksoles.com
day7.today
workseap.com
arvinlapid.com
tigerk2.com
serenablackcreatives.com
ladyyougotballs.com
sahnakz.com
farmandranchexchange.com
sentinam.info
slapnmacs.com
healthygut365.com
maximepilorge.com
ishratsvalley.com
peridotalchemy.com
solevux.com
xn--vkc6b6baa6ac1jbwc6l.com
dailyruminant.com
loocalcryptos.com
elysiancards.com
felkenbaby.com
blueridgeholisticdental.com
kd-construction.com
ciberematinfantil.com
3556a.com
shoplovevibes.com
2811152641.com
ecoconsciousart.com
surgemngmt.com
babyjim.com
copydvdmac.com
magnoliamaycandleco.com
strongroadcoaching.com
monstercustomtees.com
portoola.com
sallah-kw.com
reciperoast.com
fosnocht.com
onlineturkiye.net
soqbtiup.icu
rockjanesville.com
jxsaigonanhvu.store
bluebelttvwd.com
shipwithmrpostman.com
local-find.com
pram-essex.com
milianidelacruz.com
powellmodels.com
chathansannidhi.com
uesanjoseobrero.com
glamrescue.com
lyzy168.com
shootingstarsilver.com
peacelove.one
zhf2883.com
daisy.photos
goocir.com
mitarbeiterbekleidung.net
allsecure4u.com
gel-sitzkissen.com
jonathanmontoyalive.com
scotiabankmortgages.com
theshawarmahut.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1680-65-0x000000000041EB70-mapping.dmp formbook behavioral1/memory/1680-64-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1720-73-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 404 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PL_106104.exePL_106104.execontrol.exedescription pid process target process PID 1096 set thread context of 1680 1096 PL_106104.exe PL_106104.exe PID 1680 set thread context of 1248 1680 PL_106104.exe Explorer.EXE PID 1720 set thread context of 1248 1720 control.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
PL_106104.exePL_106104.execontrol.exepid process 1096 PL_106104.exe 1096 PL_106104.exe 1680 PL_106104.exe 1680 PL_106104.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe 1720 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PL_106104.execontrol.exepid process 1680 PL_106104.exe 1680 PL_106104.exe 1680 PL_106104.exe 1720 control.exe 1720 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PL_106104.exePL_106104.execontrol.exedescription pid process Token: SeDebugPrivilege 1096 PL_106104.exe Token: SeDebugPrivilege 1680 PL_106104.exe Token: SeDebugPrivilege 1720 control.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PL_106104.exeExplorer.EXEcontrol.exedescription pid process target process PID 1096 wrote to memory of 1680 1096 PL_106104.exe PL_106104.exe PID 1096 wrote to memory of 1680 1096 PL_106104.exe PL_106104.exe PID 1096 wrote to memory of 1680 1096 PL_106104.exe PL_106104.exe PID 1096 wrote to memory of 1680 1096 PL_106104.exe PL_106104.exe PID 1096 wrote to memory of 1680 1096 PL_106104.exe PL_106104.exe PID 1096 wrote to memory of 1680 1096 PL_106104.exe PL_106104.exe PID 1096 wrote to memory of 1680 1096 PL_106104.exe PL_106104.exe PID 1248 wrote to memory of 1720 1248 Explorer.EXE control.exe PID 1248 wrote to memory of 1720 1248 Explorer.EXE control.exe PID 1248 wrote to memory of 1720 1248 Explorer.EXE control.exe PID 1248 wrote to memory of 1720 1248 Explorer.EXE control.exe PID 1720 wrote to memory of 404 1720 control.exe cmd.exe PID 1720 wrote to memory of 404 1720 control.exe cmd.exe PID 1720 wrote to memory of 404 1720 control.exe cmd.exe PID 1720 wrote to memory of 404 1720 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\PL_106104.exeC:\Users\Admin\AppData\Local\Temp\PL_106104.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"3⤵
- Deletes itself
PID:404
-
-