Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-05-2021 18:09
Static task
static1
Behavioral task
behavioral1
Sample
PL_106104.exe
Resource
win7v20210410
General
-
Target
PL_106104.exe
-
Size
503KB
-
MD5
77f1784fa00332d5623aba88277eb8c1
-
SHA1
248f8ad49c0d3ef5ddbfaa5a8721aa4dc08acdf5
-
SHA256
7515beb02e1280d143b4716f8919e34fadfc7c806e5a354dc3dcd1dd3318882c
-
SHA512
28e6d83ed4f71557ad2d6a8c026d4ce57082cc95517aae0f7243aafc3edd5f1db70778a290b62f433fb4a5d31d3d8c9c8f119d45f9e01b8a0d6343e7a3e077c7
Malware Config
Extracted
formbook
4.1
http://www.cornerstonerecruitmentasia.com/nke/
igroomed.com
teksoles.com
day7.today
workseap.com
arvinlapid.com
tigerk2.com
serenablackcreatives.com
ladyyougotballs.com
sahnakz.com
farmandranchexchange.com
sentinam.info
slapnmacs.com
healthygut365.com
maximepilorge.com
ishratsvalley.com
peridotalchemy.com
solevux.com
xn--vkc6b6baa6ac1jbwc6l.com
dailyruminant.com
loocalcryptos.com
elysiancards.com
felkenbaby.com
blueridgeholisticdental.com
kd-construction.com
ciberematinfantil.com
3556a.com
shoplovevibes.com
2811152641.com
ecoconsciousart.com
surgemngmt.com
babyjim.com
copydvdmac.com
magnoliamaycandleco.com
strongroadcoaching.com
monstercustomtees.com
portoola.com
sallah-kw.com
reciperoast.com
fosnocht.com
onlineturkiye.net
soqbtiup.icu
rockjanesville.com
jxsaigonanhvu.store
bluebelttvwd.com
shipwithmrpostman.com
local-find.com
pram-essex.com
milianidelacruz.com
powellmodels.com
chathansannidhi.com
uesanjoseobrero.com
glamrescue.com
lyzy168.com
shootingstarsilver.com
peacelove.one
zhf2883.com
daisy.photos
goocir.com
mitarbeiterbekleidung.net
allsecure4u.com
gel-sitzkissen.com
jonathanmontoyalive.com
scotiabankmortgages.com
theshawarmahut.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3196-123-0x000000000041EB70-mapping.dmp formbook behavioral2/memory/3196-122-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2152-131-0x0000000000110000-0x000000000013E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PL_106104.exePL_106104.exeNETSTAT.EXEdescription pid process target process PID 2232 set thread context of 3196 2232 PL_106104.exe PL_106104.exe PID 3196 set thread context of 1700 3196 PL_106104.exe Explorer.EXE PID 2152 set thread context of 1700 2152 NETSTAT.EXE Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 2152 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
PL_106104.exePL_106104.exeNETSTAT.EXEpid process 2232 PL_106104.exe 2232 PL_106104.exe 3196 PL_106104.exe 3196 PL_106104.exe 3196 PL_106104.exe 3196 PL_106104.exe 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1700 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PL_106104.exeNETSTAT.EXEpid process 3196 PL_106104.exe 3196 PL_106104.exe 3196 PL_106104.exe 2152 NETSTAT.EXE 2152 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PL_106104.exePL_106104.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 2232 PL_106104.exe Token: SeDebugPrivilege 3196 PL_106104.exe Token: SeDebugPrivilege 2152 NETSTAT.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 1700 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PL_106104.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 2232 wrote to memory of 3196 2232 PL_106104.exe PL_106104.exe PID 2232 wrote to memory of 3196 2232 PL_106104.exe PL_106104.exe PID 2232 wrote to memory of 3196 2232 PL_106104.exe PL_106104.exe PID 2232 wrote to memory of 3196 2232 PL_106104.exe PL_106104.exe PID 2232 wrote to memory of 3196 2232 PL_106104.exe PL_106104.exe PID 2232 wrote to memory of 3196 2232 PL_106104.exe PL_106104.exe PID 1700 wrote to memory of 2152 1700 Explorer.EXE NETSTAT.EXE PID 1700 wrote to memory of 2152 1700 Explorer.EXE NETSTAT.EXE PID 1700 wrote to memory of 2152 1700 Explorer.EXE NETSTAT.EXE PID 2152 wrote to memory of 376 2152 NETSTAT.EXE cmd.exe PID 2152 wrote to memory of 376 2152 NETSTAT.EXE cmd.exe PID 2152 wrote to memory of 376 2152 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\PL_106104.exeC:\Users\Admin\AppData\Local\Temp\PL_106104.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2080
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"3⤵PID:376
-
-