Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en -
submitted
10-09-2021 10:14
Static task
static1
Behavioral task
behavioral1
Sample
PLM-QUOT-292MKV AST.exe
Resource
win7-en
General
-
Target
PLM-QUOT-292MKV AST.exe
-
Size
525KB
-
MD5
4d212e509348f56edb404d564a19d6b8
-
SHA1
59d3542f9e2f3e74078e837e5cba3d46d1414ad8
-
SHA256
3c74c617119a6ba48fd332b234183150245f1594acf80eb51935783d68d4f783
-
SHA512
89bf3a8a1232662245c6b4b96f69801027635f38b5de4099eb6c6fbffc944b38bb8e50362b586a10ae1c31b43f0565a62222b6c9bf6a9a8364d6d3c43645e463
Malware Config
Extracted
formbook
4.1
ergs
http://www.barry-associates.com/ergs/
jardineriavilanova.com
highkeyfashionboutique.com
willingtobuyyourhouse.com
ysfno.com
bjkhjzzs.com
hexmotif.com
intentionalerror.com
nuu-foundfreedom.com
catalystspeechservices.com
blackmybail.com
xntaobaozhibo.com
site-sozdat.online
45quisisanadr.com
ipawlove.com
yifa5188.com
admm.email
houseoftealbh.com
scale-biz.com
vdvppt.club
loveandlight.life
529jpmorgan.com
pupupe.com
asantejaratmavi.com
stereovisionstudio.com
anhhoangnhatle.com
robrowerealestate.com
accessorthopaedics.com
vanaform.com
hataribeauty.com
karnez.net
meghanariana.com
lawboutique30.com
sailoame.com
waystoearnmoneyontheside.com
alkalides.com
finqian.com
ic-video-editing.co.uk
vomartdesign.xyz
xn--icknb7d2bb8tv280bco4a.com
containerreefer.com
maison-connect.com
fbtowww.com
phoenizoo.com
bet365l6.com
royalglossesbss.com
justiceforashleymoore.com
hupubets.com
technomarkets.info
ahhaads.com
vvbeautystudio.com
ddogo2o4r.online
ameliefantaisie.com
signupforhuntington.com
antibodycovid19testkit.com
kuznecova.center
yuxingo.com
heseasy.site
wilmingtondollshow.com
196197.com
domineaconfeitaria.com
veryzocn.com
regenerativesouls.com
llamshop.com
miami-autoparts.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4864-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4864-126-0x000000000041EB70-mapping.dmp formbook behavioral2/memory/4908-132-0x0000000001080000-0x00000000010AE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PLM-QUOT-292MKV AST.exePLM-QUOT-292MKV AST.execolorcpl.exedescription pid process target process PID 4736 set thread context of 4864 4736 PLM-QUOT-292MKV AST.exe PLM-QUOT-292MKV AST.exe PID 4864 set thread context of 2532 4864 PLM-QUOT-292MKV AST.exe Explorer.EXE PID 4908 set thread context of 2532 4908 colorcpl.exe Explorer.EXE -
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
PLM-QUOT-292MKV AST.execolorcpl.exepid process 4864 PLM-QUOT-292MKV AST.exe 4864 PLM-QUOT-292MKV AST.exe 4864 PLM-QUOT-292MKV AST.exe 4864 PLM-QUOT-292MKV AST.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe 4908 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2532 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PLM-QUOT-292MKV AST.execolorcpl.exepid process 4864 PLM-QUOT-292MKV AST.exe 4864 PLM-QUOT-292MKV AST.exe 4864 PLM-QUOT-292MKV AST.exe 4908 colorcpl.exe 4908 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
PLM-QUOT-292MKV AST.execolorcpl.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 4864 PLM-QUOT-292MKV AST.exe Token: SeDebugPrivilege 4908 colorcpl.exe Token: SeShutdownPrivilege 2532 Explorer.EXE Token: SeCreatePagefilePrivilege 2532 Explorer.EXE Token: SeShutdownPrivilege 2532 Explorer.EXE Token: SeCreatePagefilePrivilege 2532 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 2532 Explorer.EXE 2532 Explorer.EXE 2532 Explorer.EXE 2532 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PLM-QUOT-292MKV AST.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 4736 wrote to memory of 4864 4736 PLM-QUOT-292MKV AST.exe PLM-QUOT-292MKV AST.exe PID 4736 wrote to memory of 4864 4736 PLM-QUOT-292MKV AST.exe PLM-QUOT-292MKV AST.exe PID 4736 wrote to memory of 4864 4736 PLM-QUOT-292MKV AST.exe PLM-QUOT-292MKV AST.exe PID 4736 wrote to memory of 4864 4736 PLM-QUOT-292MKV AST.exe PLM-QUOT-292MKV AST.exe PID 4736 wrote to memory of 4864 4736 PLM-QUOT-292MKV AST.exe PLM-QUOT-292MKV AST.exe PID 4736 wrote to memory of 4864 4736 PLM-QUOT-292MKV AST.exe PLM-QUOT-292MKV AST.exe PID 2532 wrote to memory of 4908 2532 Explorer.EXE colorcpl.exe PID 2532 wrote to memory of 4908 2532 Explorer.EXE colorcpl.exe PID 2532 wrote to memory of 4908 2532 Explorer.EXE colorcpl.exe PID 4908 wrote to memory of 4936 4908 colorcpl.exe cmd.exe PID 4908 wrote to memory of 4936 4908 colorcpl.exe cmd.exe PID 4908 wrote to memory of 4936 4908 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PLM-QUOT-292MKV AST.exe"C:\Users\Admin\AppData\Local\Temp\PLM-QUOT-292MKV AST.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PLM-QUOT-292MKV AST.exe"C:\Users\Admin\AppData\Local\Temp\PLM-QUOT-292MKV AST.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PLM-QUOT-292MKV AST.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2532-128-0x0000000005E10000-0x0000000005FA8000-memory.dmpFilesize
1.6MB
-
memory/2532-136-0x00000000006E0000-0x00000000007C2000-memory.dmpFilesize
904KB
-
memory/4736-117-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/4736-118-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/4736-119-0x0000000004BE0000-0x0000000004BE1000-memory.dmpFilesize
4KB
-
memory/4736-120-0x0000000008030000-0x0000000008031000-memory.dmpFilesize
4KB
-
memory/4736-121-0x0000000004DF0000-0x0000000004DF7000-memory.dmpFilesize
28KB
-
memory/4736-122-0x00000000049D0000-0x0000000004ECE000-memory.dmpFilesize
5.0MB
-
memory/4736-123-0x0000000006870000-0x00000000068D4000-memory.dmpFilesize
400KB
-
memory/4736-124-0x0000000006920000-0x000000000694F000-memory.dmpFilesize
188KB
-
memory/4736-115-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/4864-126-0x000000000041EB70-mapping.dmp
-
memory/4864-129-0x0000000000F60000-0x0000000000F74000-memory.dmpFilesize
80KB
-
memory/4864-127-0x00000000013F0000-0x0000000001710000-memory.dmpFilesize
3.1MB
-
memory/4864-125-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/4908-130-0x0000000000000000-mapping.dmp
-
memory/4908-131-0x0000000001120000-0x0000000001139000-memory.dmpFilesize
100KB
-
memory/4908-132-0x0000000001080000-0x00000000010AE000-memory.dmpFilesize
184KB
-
memory/4908-134-0x0000000005120000-0x0000000005440000-memory.dmpFilesize
3.1MB
-
memory/4908-135-0x0000000005040000-0x00000000050D3000-memory.dmpFilesize
588KB
-
memory/4936-133-0x0000000000000000-mapping.dmp