Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-05-2021 14:44
Static task
static1
Behavioral task
behavioral1
Sample
PO#6275473, Shipping.exe
Resource
win7v20210410
General
-
Target
PO#6275473, Shipping.exe
-
Size
665KB
-
MD5
cb78b28dea109d0e11a05934e02cf9d8
-
SHA1
caab11bc17589dc8d20805070d1e343d60192751
-
SHA256
5f05f0816898db3798aaa6722cfbd0f625a0eac271b72d0b8c295fa056dff733
-
SHA512
8b53f9c263efd1c2ef9011de1112deac3d15d7d31cdf4061f2cca19a4a713bca873d6f0ee0778d3a7eafbbe62a23e891dea8668164f2e9d20645f0aed3a8abaa
Malware Config
Extracted
formbook
4.1
http://www.magnumopuspro.com/nyr/
anemone-vintage.com
ironcitytools.com
joshandmatthew.com
breathtakingscenery.photos
karabakh-terror.com
micahelgall.com
entretiendesterrasses.com
mhgholdings.com
blewm.com
sidewalknotary.com
ytrs-elec.com
danhpham.com
ma21cle2henz.xyz
lotusforlease.com
shipleyphotoandfilm.com
bulktool.xyz
ouedzmala.com
yichengvpr.com
connectmygames.com
chjcsc.com
dope-chocolate.com
tacowench.com
projectsbay.com
xn--pgboc92d.com
royaldropofoil.com
ranguanglian.club
mobilne-kucice.com
buytsycon.com
goiasbets.net
blpetroleum.com
starrealms.net
exclusiveflooringcollection.com
kudalive.com
tienda-sky.com
drillinginsider.info
theglasshousenyc.com
vietnammoi.xyz
walterbenicio.com
zoomtvliveshows.xyz
boujiehoodbaby.com
yzyangyu.com
exploreecetera.com
sycord.com
waykifood.com
shadingconsultancy.com
precedentai.net
linhanhkitchen.com
expekt24.com
socialdating24.com
lubvim.com
floryi.com
alerist.com
maluss.com
hitbbq.com
alerrandrotattoo.com
algoplayer.com
idahooutsiders.com
qygmuakhk.club
neverpossible.com
winparadigm.com
toughdecorative.com
yourbuildmedia.com
summercrowd.com
josemvazquez.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1096-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1096-125-0x000000000041EBA0-mapping.dmp formbook behavioral2/memory/2104-132-0x0000000002E90000-0x0000000002EBE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO#6275473, Shipping.exePO#6275473, Shipping.exemstsc.exedescription pid process target process PID 3652 set thread context of 1096 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 1096 set thread context of 2996 1096 PO#6275473, Shipping.exe Explorer.EXE PID 2104 set thread context of 2996 2104 mstsc.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
PO#6275473, Shipping.exePO#6275473, Shipping.exemstsc.exepid process 3652 PO#6275473, Shipping.exe 3652 PO#6275473, Shipping.exe 1096 PO#6275473, Shipping.exe 1096 PO#6275473, Shipping.exe 1096 PO#6275473, Shipping.exe 1096 PO#6275473, Shipping.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe 2104 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PO#6275473, Shipping.exemstsc.exepid process 1096 PO#6275473, Shipping.exe 1096 PO#6275473, Shipping.exe 1096 PO#6275473, Shipping.exe 2104 mstsc.exe 2104 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO#6275473, Shipping.exePO#6275473, Shipping.exemstsc.exedescription pid process Token: SeDebugPrivilege 3652 PO#6275473, Shipping.exe Token: SeDebugPrivilege 1096 PO#6275473, Shipping.exe Token: SeDebugPrivilege 2104 mstsc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PO#6275473, Shipping.exeExplorer.EXEmstsc.exedescription pid process target process PID 3652 wrote to memory of 3372 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 3372 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 3372 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 1096 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 1096 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 1096 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 1096 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 1096 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 3652 wrote to memory of 1096 3652 PO#6275473, Shipping.exe PO#6275473, Shipping.exe PID 2996 wrote to memory of 2104 2996 Explorer.EXE mstsc.exe PID 2996 wrote to memory of 2104 2996 Explorer.EXE mstsc.exe PID 2996 wrote to memory of 2104 2996 Explorer.EXE mstsc.exe PID 2104 wrote to memory of 3860 2104 mstsc.exe cmd.exe PID 2104 wrote to memory of 3860 2104 mstsc.exe cmd.exe PID 2104 wrote to memory of 3860 2104 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\PO#6275473, Shipping.exe"C:\Users\Admin\AppData\Local\Temp\PO#6275473, Shipping.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\PO#6275473, Shipping.exe"C:\Users\Admin\AppData\Local\Temp\PO#6275473, Shipping.exe"3⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\PO#6275473, Shipping.exe"C:\Users\Admin\AppData\Local\Temp\PO#6275473, Shipping.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO#6275473, Shipping.exe"3⤵PID:3860
-
-