Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 15:27
Static task
static1
Behavioral task
behavioral1
Sample
2bINu9BOqKtJHoo.exe
Resource
win7v20210410
General
-
Target
2bINu9BOqKtJHoo.exe
-
Size
1.1MB
-
MD5
b8b1a1e689be765aad3fe0f8d97199af
-
SHA1
96b923aaa5b0d3e9974b4080298bb8a7bcfcf725
-
SHA256
f0e734543c047d2ca1a76a4e47553e85d50c57ff9d3dfbd0e55806ff890fef38
-
SHA512
1f64bbf0bed9cc5cd04da93a9da7346774a493f73171b87f1331da5d00dc970d054ccc73935e57341512bd7d8827c3c88319f4458c30f0d09a6b25c91f356f7c
Malware Config
Extracted
formbook
4.1
http://www.bulverderoofing.com/lt0h/
originalindigofurniture.co.uk
fl6588.com
acecademy.com
yaerofinerindalnalising.com
mendilovic.online
rishenght.com
famlees.com
myhomeofficemarket.com
bouquetarabia.com
chrisbani.com
freebandslegally.com
hernandezinsurancegroup.net
slicedandfresh.com
apnathikanas.com
chadhatesyou.com
ansilsas.com
in3development.com
nitiren.net
peespn.com
valengz.com
theseakelpcompany.com
tlcrentny.com
sancakcraft.com
kamenb.com
samanthajobenson.com
alphagearz.com
sprins.net
adestramentos.com
civoconstruction.com
masrmasr.com
jagrit.codes
zusammenurlaub.com
mssjqs.com
ic695niu001.com
anelimplus.com
mutlob.com
beyondmickey.net
sliever.club
perfumefashion.icu
massimilianogiannocco.com
dentoncountyattorneys.media
filigreefilly.com
mooremgmtandcompany.com
smpdj.com
stainlesspropmgmt.com
creativecollectivecommunity.com
dmdrogist.com
spokenandheardpodcast.com
garenbid.com
bestcomandcalls.space
tairunshihua.com
nemski-projekt.com
6mum.com
portlandhemorrhoidcenter.com
platinumforsale.net
driven.plus
ontheedgeoutdoorshunting.com
manatapmasalalu.com
idscustomprinting.com
safepassagereform.com
fairop.xyz
natetacticz.com
etoys-sucks.com
rhinolabs.net
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/996-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/996-126-0x000000000041EB60-mapping.dmp formbook behavioral2/memory/3736-132-0x0000000000F20000-0x0000000000F4E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2bINu9BOqKtJHoo.exe2bINu9BOqKtJHoo.exenetsh.exedescription pid process target process PID 776 set thread context of 996 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 996 set thread context of 3020 996 2bINu9BOqKtJHoo.exe Explorer.EXE PID 3736 set thread context of 3020 3736 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
2bINu9BOqKtJHoo.exe2bINu9BOqKtJHoo.exenetsh.exepid process 776 2bINu9BOqKtJHoo.exe 776 2bINu9BOqKtJHoo.exe 996 2bINu9BOqKtJHoo.exe 996 2bINu9BOqKtJHoo.exe 996 2bINu9BOqKtJHoo.exe 996 2bINu9BOqKtJHoo.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe 3736 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
2bINu9BOqKtJHoo.exenetsh.exepid process 996 2bINu9BOqKtJHoo.exe 996 2bINu9BOqKtJHoo.exe 996 2bINu9BOqKtJHoo.exe 3736 netsh.exe 3736 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2bINu9BOqKtJHoo.exe2bINu9BOqKtJHoo.exenetsh.exedescription pid process Token: SeDebugPrivilege 776 2bINu9BOqKtJHoo.exe Token: SeDebugPrivilege 996 2bINu9BOqKtJHoo.exe Token: SeDebugPrivilege 3736 netsh.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
2bINu9BOqKtJHoo.exeExplorer.EXEnetsh.exedescription pid process target process PID 776 wrote to memory of 3000 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 3000 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 3000 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 996 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 996 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 996 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 996 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 996 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 776 wrote to memory of 996 776 2bINu9BOqKtJHoo.exe 2bINu9BOqKtJHoo.exe PID 3020 wrote to memory of 3736 3020 Explorer.EXE netsh.exe PID 3020 wrote to memory of 3736 3020 Explorer.EXE netsh.exe PID 3020 wrote to memory of 3736 3020 Explorer.EXE netsh.exe PID 3736 wrote to memory of 3916 3736 netsh.exe cmd.exe PID 3736 wrote to memory of 3916 3736 netsh.exe cmd.exe PID 3736 wrote to memory of 3916 3736 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\2bINu9BOqKtJHoo.exe"C:\Users\Admin\AppData\Local\Temp\2bINu9BOqKtJHoo.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\2bINu9BOqKtJHoo.exe"C:\Users\Admin\AppData\Local\Temp\2bINu9BOqKtJHoo.exe"3⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\2bINu9BOqKtJHoo.exe"C:\Users\Admin\AppData\Local\Temp\2bINu9BOqKtJHoo.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\2bINu9BOqKtJHoo.exe"3⤵PID:3916
-
-