Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-07-2021 09:32
Static task
static1
Behavioral task
behavioral1
Sample
Orden de producto.exe
Resource
win7v20210408
General
-
Target
Orden de producto.exe
-
Size
736KB
-
MD5
967d2dd88fe4a18a1593c5fb25da4a6e
-
SHA1
5295dbd3fd2d828e56d20741db9fbd84e809cfa7
-
SHA256
e324db0ece1d167afd6b4344e41ae12cd39bf5b87b774722c52b0408fe156ca1
-
SHA512
1e532896797738ad655c31c3be06d16453049d23bf7a78e08358ae41d45b2d5d2db02e5c8383334529faeb84040b7c59a668adcb22198b8f3fd6196a07f18ef6
Malware Config
Extracted
formbook
4.1
http://www.kmresults.com/n7ak/
modischoolcbse.com
theneverwinter.com
rszkjx-vps-hosting.website
fnihil.com
1pbet.com
nnowzscorrez.com
uaotgvjl.icu
starmapsqatar.com
ekisilani.com
extradeepsheets.com
jam-nins.com
buranly.com
orixentertainment.com
rawtech.energy
myol.guru
utex.club
jiapie.com
wowig.store
wweidlyyl.com
systaskautomation.com
citromudas3a.com
plasticstone.icu
pawchamamapet.com
beautybybby.com
mor-n-mor.com
getoffyourhighhorses.com
chieucaochoban9.xyz
grahamevansmp.com
amplaassessoria.net
nutricookindia.com
wazymbex.icu
joansironing.com
hallforless.com
mycourseprofits.com
precps.com
cookislandstourismpodcast.com
bestonlinedealslive.com
bug.chat
ptjbtoqonjtrwpvkfgmjvwp.com
tortniespodzianka.store
qxkbjgj.icu
aurashape.com
guinealive.com
mondialeresources.com
offthebreak.site
maxamproductivity.com
thebiztip.com
thelocalrea.com
laeducacionadistancia.com
inpakgroup.com
lvgang360.com
allvegangoods.com
tymudanzaramos.com
simpleframeswork.com
thehappycars.com
directfenetres.net
norskatferdsterapi.com
hostingcnx.com
ksmh5x.com
thespiritworldinvitational.com
jetsetwilly3.com
gameflexdev.com
tryhuge.com
vaporvspaper.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4264-115-0x0000000000000000-mapping.dmp formbook behavioral2/memory/4264-117-0x0000000010410000-0x000000001043E000-memory.dmp formbook behavioral2/memory/584-126-0x0000000003160000-0x000000000318E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
DpiScaling.exenetsh.exedescription pid process target process PID 4264 set thread context of 3048 4264 DpiScaling.exe Explorer.EXE PID 4264 set thread context of 3048 4264 DpiScaling.exe Explorer.EXE PID 584 set thread context of 3048 584 netsh.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3984 4648 WerFault.exe Orden de producto.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WerFault.exeDpiScaling.exenetsh.exepid process 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 4264 DpiScaling.exe 4264 DpiScaling.exe 4264 DpiScaling.exe 4264 DpiScaling.exe 4264 DpiScaling.exe 4264 DpiScaling.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe 584 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3048 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
DpiScaling.exenetsh.exepid process 4264 DpiScaling.exe 4264 DpiScaling.exe 4264 DpiScaling.exe 4264 DpiScaling.exe 584 netsh.exe 584 netsh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
WerFault.exeDpiScaling.exenetsh.exedescription pid process Token: SeRestorePrivilege 3984 WerFault.exe Token: SeBackupPrivilege 3984 WerFault.exe Token: SeDebugPrivilege 3984 WerFault.exe Token: SeDebugPrivilege 4264 DpiScaling.exe Token: SeDebugPrivilege 584 netsh.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3048 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Orden de producto.exeExplorer.EXEnetsh.exedescription pid process target process PID 4648 wrote to memory of 4264 4648 Orden de producto.exe DpiScaling.exe PID 4648 wrote to memory of 4264 4648 Orden de producto.exe DpiScaling.exe PID 4648 wrote to memory of 4264 4648 Orden de producto.exe DpiScaling.exe PID 4648 wrote to memory of 4264 4648 Orden de producto.exe DpiScaling.exe PID 4648 wrote to memory of 4264 4648 Orden de producto.exe DpiScaling.exe PID 4648 wrote to memory of 4264 4648 Orden de producto.exe DpiScaling.exe PID 3048 wrote to memory of 584 3048 Explorer.EXE netsh.exe PID 3048 wrote to memory of 584 3048 Explorer.EXE netsh.exe PID 3048 wrote to memory of 584 3048 Explorer.EXE netsh.exe PID 584 wrote to memory of 1076 584 netsh.exe cmd.exe PID 584 wrote to memory of 1076 584 netsh.exe cmd.exe PID 584 wrote to memory of 1076 584 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Orden de producto.exe"C:\Users\Admin\AppData\Local\Temp\Orden de producto.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 12603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\DpiScaling.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/584-123-0x0000000000000000-mapping.dmp
-
memory/584-128-0x0000000003780000-0x0000000003813000-memory.dmpFilesize
588KB
-
memory/584-127-0x0000000003A20000-0x0000000003D40000-memory.dmpFilesize
3.1MB
-
memory/584-126-0x0000000003160000-0x000000000318E000-memory.dmpFilesize
184KB
-
memory/584-125-0x0000000000C70000-0x0000000000C8E000-memory.dmpFilesize
120KB
-
memory/1076-124-0x0000000000000000-mapping.dmp
-
memory/3048-122-0x0000000006300000-0x000000000648B000-memory.dmpFilesize
1.5MB
-
memory/3048-120-0x0000000006150000-0x00000000062F1000-memory.dmpFilesize
1.6MB
-
memory/3048-129-0x00000000029B0000-0x0000000002A7D000-memory.dmpFilesize
820KB
-
memory/4264-121-0x0000000000DB0000-0x0000000000DC4000-memory.dmpFilesize
80KB
-
memory/4264-118-0x0000000004560000-0x0000000004880000-memory.dmpFilesize
3.1MB
-
memory/4264-119-0x0000000000D70000-0x0000000000D84000-memory.dmpFilesize
80KB
-
memory/4264-117-0x0000000010410000-0x000000001043E000-memory.dmpFilesize
184KB
-
memory/4264-116-0x00000000004B0000-0x00000000004B1000-memory.dmpFilesize
4KB
-
memory/4264-115-0x0000000000000000-mapping.dmp
-
memory/4648-114-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB