Analysis
-
max time kernel
150s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10-05-2021 08:05
Static task
static1
Behavioral task
behavioral1
Sample
INv02938727.exe
Resource
win7v20210410
General
-
Target
INv02938727.exe
-
Size
702KB
-
MD5
a3b74acf9723e53d6caea736faae9708
-
SHA1
2714e0ec97d81921312f0db6470dc40f55d16b96
-
SHA256
f8e8f64bb17ffb2fea18b7671602a76a8b5734607c7a7ae035dce8eed8381a74
-
SHA512
e468c5146e35f8aae5536c7ce6c490b68588af0f71fd5d85d0b1dfe9b1831be55a2d9b8787035fc95e288f41c7ab7c4cf73965d6707bbfbe4685655ffbe4fa6b
Malware Config
Extracted
formbook
4.1
http://www.hometowncashbuyersgroup.com/kkt/
inspirafutebol.com
customgiftshouston.com
mycreativelending.com
psplaystore.com
newlivingsolutionshop.com
dechefamsterdam.com
servicingl0ans.com
atsdholdings.com
manifestarz.com
sequenceanalytica.com
gethealthcaresmart.com
theartofsurprises.com
pirateequitypatrick.com
alliance-ce.com
wingrushusa.com
funtimespheres.com
solevux.com
antimasathya.com
profitexcavator.com
lankeboxshop.com
aarthiramamurthy.com
oldmopaiv.xyz
mavispaguzellik.com
milkamax.com
sputnikvasisi.com
gametoyou.com
sisconbol.com
thedreamcertificate.com
vichy-menuiserie.com
pv-step.com
growingmindstrilingual.com
tlcrentny.com
jedshomebuilders.com
curtailit.com
integruschamber.com
lanzamientosbimbocolombia.com
tightlinesfishingco.com
doubleuphome.com
arctic.solar
unstopabbledomains.com
aggiornamento-isp.info
clarkandhurnlaw.com
barefootbirthstl.com
seanfeuct.com
measureformeasurehome.com
stephsavy.com
loveflowersandevents.com
czsis.com
midnightblueinc.com
today.dental
customwithme.com
edisetiyo.com
jasoneganrealtor.com
rihxertiza.com
seahorseblast.net
nedayerasa.com
cliftonheightshoa.net
theprofilemba.com
cfwoods.com
dogggo.com
casatranquillainletbeach.com
u1023.com
aromakapseln.com
zhwanjie.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3984-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3984-126-0x000000000041EBD0-mapping.dmp formbook behavioral2/memory/3908-134-0x0000000001190000-0x00000000011BE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
INv02938727.exeINv02938727.exenetsh.exedescription pid process target process PID 4660 set thread context of 3984 4660 INv02938727.exe INv02938727.exe PID 3984 set thread context of 3048 3984 INv02938727.exe Explorer.EXE PID 3908 set thread context of 3048 3908 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
INv02938727.exenetsh.exepid process 3984 INv02938727.exe 3984 INv02938727.exe 3984 INv02938727.exe 3984 INv02938727.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe 3908 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
INv02938727.exenetsh.exepid process 3984 INv02938727.exe 3984 INv02938727.exe 3984 INv02938727.exe 3908 netsh.exe 3908 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
INv02938727.exenetsh.exedescription pid process Token: SeDebugPrivilege 3984 INv02938727.exe Token: SeDebugPrivilege 3908 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
INv02938727.exeExplorer.EXEnetsh.exedescription pid process target process PID 4660 wrote to memory of 3984 4660 INv02938727.exe INv02938727.exe PID 4660 wrote to memory of 3984 4660 INv02938727.exe INv02938727.exe PID 4660 wrote to memory of 3984 4660 INv02938727.exe INv02938727.exe PID 4660 wrote to memory of 3984 4660 INv02938727.exe INv02938727.exe PID 4660 wrote to memory of 3984 4660 INv02938727.exe INv02938727.exe PID 4660 wrote to memory of 3984 4660 INv02938727.exe INv02938727.exe PID 3048 wrote to memory of 3908 3048 Explorer.EXE netsh.exe PID 3048 wrote to memory of 3908 3048 Explorer.EXE netsh.exe PID 3048 wrote to memory of 3908 3048 Explorer.EXE netsh.exe PID 3908 wrote to memory of 4188 3908 netsh.exe cmd.exe PID 3908 wrote to memory of 4188 3908 netsh.exe cmd.exe PID 3908 wrote to memory of 4188 3908 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\INv02938727.exe"C:\Users\Admin\AppData\Local\Temp\INv02938727.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\INv02938727.exe"C:\Users\Admin\AppData\Local\Temp\INv02938727.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3984 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INv02938727.exe"3⤵PID:4188