Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-07-2021 06:44
Static task
static1
Behavioral task
behavioral1
Sample
mal.pif.exe
Resource
win7v20210410
General
-
Target
mal.pif.exe
-
Size
591KB
-
MD5
b9bca038d7532ec8a1a9ba0e867061bc
-
SHA1
6596ac1216bf03d88482415755c499ed6388cab4
-
SHA256
24d91f6c3dcad36d65e45821d520aaabc2f4a87bb1ab512d6807377010d5680e
-
SHA512
861bfb748cd3060698d23e04e0b58d2e2eb12dedfbfdeeece6a5643bdeab9472bbe3f73d144e95fd78e8ee862ae3fde9385b11b2f35b0ea0c974326d70846e6d
Malware Config
Extracted
formbook
4.1
http://www.trendtechpros.com/sm3l/
svp-india.com
feistyflowerfarmers.com
artprogressive.com
thedavidweaver.com
currentputative.life
bluedot3dwdbuy.com
xxxmeetme.com
signify2.com
converseshoes-canada.com
schemabuilder.net
crmcti.com
mctrh.com
ringroadpartners.com
stresslesspilates.com
directorytexas.xyz
sarahcarver.com
diigveda.com
lifeliveslive.com
inprize2020.club
sellerbantuan-bukalapak.com
thesawbuddy.com
vtolworldwide.com
montespc.com
mylifeinpark.com
etten-api.com
plantersam.com
themcg.net
tax-account.net
laurelhomesgroup.com
epmconsultants.com
air.guide
shopfabrique.com
publicretirementinfo.com
diversifiedforest.com
bodurm.com
aphroditesspiritualshop.com
vinowolf.com
teja-online.com
junion.site
regenmedica.com
soulfulparent.com
elcorazondemama.com
bench-oat.com
abrewhomes.com
premiocovid-19.com
palmaunlocked.com
bylauralittle.com
stikepage.com
miabogadorolon.com
hungyivn.com
interlacer.com
liang831113.com
onlinepracticebox.com
easycookingmastermind.com
murderofasun.tech
mybabytennis.com
margaritagift.com
utx88.com
bofengjiaoyegs.com
reforming-toilets.xyz
eaoaj.com
only-king.com
nearinn.com
fitsportshop.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2736-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2736-125-0x000000000041EB40-mapping.dmp formbook behavioral2/memory/3632-132-0x0000000003280000-0x00000000032AE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
mal.pif.exemal.pif.exeNETSTAT.EXEdescription pid process target process PID 636 set thread context of 2736 636 mal.pif.exe mal.pif.exe PID 2736 set thread context of 3052 2736 mal.pif.exe Explorer.EXE PID 3632 set thread context of 3052 3632 NETSTAT.EXE Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 3632 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
mal.pif.exeNETSTAT.EXEpid process 2736 mal.pif.exe 2736 mal.pif.exe 2736 mal.pif.exe 2736 mal.pif.exe 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE 3632 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3052 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
mal.pif.exeNETSTAT.EXEpid process 2736 mal.pif.exe 2736 mal.pif.exe 2736 mal.pif.exe 3632 NETSTAT.EXE 3632 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
mal.pif.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 2736 mal.pif.exe Token: SeDebugPrivilege 3632 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
mal.pif.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 636 wrote to memory of 2736 636 mal.pif.exe mal.pif.exe PID 636 wrote to memory of 2736 636 mal.pif.exe mal.pif.exe PID 636 wrote to memory of 2736 636 mal.pif.exe mal.pif.exe PID 636 wrote to memory of 2736 636 mal.pif.exe mal.pif.exe PID 636 wrote to memory of 2736 636 mal.pif.exe mal.pif.exe PID 636 wrote to memory of 2736 636 mal.pif.exe mal.pif.exe PID 3052 wrote to memory of 3632 3052 Explorer.EXE NETSTAT.EXE PID 3052 wrote to memory of 3632 3052 Explorer.EXE NETSTAT.EXE PID 3052 wrote to memory of 3632 3052 Explorer.EXE NETSTAT.EXE PID 3632 wrote to memory of 1920 3632 NETSTAT.EXE cmd.exe PID 3632 wrote to memory of 1920 3632 NETSTAT.EXE cmd.exe PID 3632 wrote to memory of 1920 3632 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mal.pif.exe"C:\Users\Admin\AppData\Local\Temp\mal.pif.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mal.pif.exe"C:\Users\Admin\AppData\Local\Temp\mal.pif.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\mal.pif.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/636-114-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/636-116-0x0000000007C10000-0x0000000007C11000-memory.dmpFilesize
4KB
-
memory/636-117-0x00000000077F0000-0x00000000077F1000-memory.dmpFilesize
4KB
-
memory/636-118-0x0000000007890000-0x0000000007891000-memory.dmpFilesize
4KB
-
memory/636-119-0x0000000007710000-0x0000000007C0E000-memory.dmpFilesize
5.0MB
-
memory/636-120-0x00000000077A0000-0x00000000077A1000-memory.dmpFilesize
4KB
-
memory/636-121-0x0000000002BB0000-0x0000000002BC1000-memory.dmpFilesize
68KB
-
memory/636-122-0x0000000007490000-0x0000000007506000-memory.dmpFilesize
472KB
-
memory/636-123-0x0000000007530000-0x0000000007562000-memory.dmpFilesize
200KB
-
memory/1920-130-0x0000000000000000-mapping.dmp
-
memory/2736-125-0x000000000041EB40-mapping.dmp
-
memory/2736-127-0x0000000001D10000-0x0000000001D24000-memory.dmpFilesize
80KB
-
memory/2736-126-0x0000000001910000-0x0000000001C30000-memory.dmpFilesize
3.1MB
-
memory/2736-124-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3052-128-0x0000000002550000-0x0000000002609000-memory.dmpFilesize
740KB
-
memory/3052-135-0x00000000060F0000-0x00000000061D4000-memory.dmpFilesize
912KB
-
memory/3632-129-0x0000000000000000-mapping.dmp
-
memory/3632-131-0x0000000000B30000-0x0000000000B3B000-memory.dmpFilesize
44KB
-
memory/3632-132-0x0000000003280000-0x00000000032AE000-memory.dmpFilesize
184KB
-
memory/3632-133-0x00000000032B0000-0x00000000033FA000-memory.dmpFilesize
1.3MB
-
memory/3632-134-0x0000000003770000-0x0000000003803000-memory.dmpFilesize
588KB