Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
23-09-2021 13:04
Static task
static1
Behavioral task
behavioral1
Sample
fotos de muestras de productos pdf.exe
Resource
win7v20210408
General
-
Target
fotos de muestras de productos pdf.exe
-
Size
984KB
-
MD5
0e78b6d62260340f4c66085b34e30f6b
-
SHA1
3858e1c6d6ad625a0dbe8c08f1efdd5389164caa
-
SHA256
294c51109403fa50956ad9381fea61e33d1ea7bcfe24c0631e42db5fa2258488
-
SHA512
739d7a115c921944ea36541b77e522b2142805f4ba649ff4026b56a016d037e27ab906046ec6d0c7590df19fbace7ebc0e04ad6af2b44a710f9a8ba45f1e7215
Malware Config
Extracted
formbook
4.1
n7ak
http://www.kmresults.com/n7ak/
modischoolcbse.com
theneverwinter.com
rszkjx-vps-hosting.website
fnihil.com
1pbet.com
nnowzscorrez.com
uaotgvjl.icu
starmapsqatar.com
ekisilani.com
extradeepsheets.com
jam-nins.com
buranly.com
orixentertainment.com
rawtech.energy
myol.guru
utex.club
jiapie.com
wowig.store
wweidlyyl.com
systaskautomation.com
citromudas3a.com
plasticstone.icu
pawchamamapet.com
beautybybby.com
mor-n-mor.com
getoffyourhighhorses.com
chieucaochoban9.xyz
grahamevansmp.com
amplaassessoria.net
nutricookindia.com
wazymbex.icu
joansironing.com
hallforless.com
mycourseprofits.com
precps.com
cookislandstourismpodcast.com
bestonlinedealslive.com
bug.chat
ptjbtoqonjtrwpvkfgmjvwp.com
tortniespodzianka.store
qxkbjgj.icu
aurashape.com
guinealive.com
mondialeresources.com
offthebreak.site
maxamproductivity.com
thebiztip.com
thelocalrea.com
laeducacionadistancia.com
inpakgroup.com
lvgang360.com
allvegangoods.com
tymudanzaramos.com
simpleframeswork.com
thehappycars.com
directfenetres.net
norskatferdsterapi.com
hostingcnx.com
ksmh5x.com
thespiritworldinvitational.com
jetsetwilly3.com
gameflexdev.com
tryhuge.com
vaporvspaper.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4072-117-0x0000000000000000-mapping.dmp formbook behavioral2/memory/4072-119-0x0000000010410000-0x000000001043E000-memory.dmp formbook behavioral2/memory/2592-125-0x00000000007A0000-0x00000000007CE000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
Processes:
DpiScaling.exeexplorer.exedescription pid process target process PID 4072 set thread context of 3048 4072 DpiScaling.exe Explorer.EXE PID 2592 set thread context of 3048 2592 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
DpiScaling.exeexplorer.exepid process 4072 DpiScaling.exe 4072 DpiScaling.exe 4072 DpiScaling.exe 4072 DpiScaling.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe 2592 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3048 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
DpiScaling.exeexplorer.exepid process 4072 DpiScaling.exe 4072 DpiScaling.exe 4072 DpiScaling.exe 2592 explorer.exe 2592 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DpiScaling.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4072 DpiScaling.exe Token: SeDebugPrivilege 2592 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fotos de muestras de productos pdf.exeExplorer.EXEexplorer.exedescription pid process target process PID 4168 wrote to memory of 4072 4168 fotos de muestras de productos pdf.exe DpiScaling.exe PID 4168 wrote to memory of 4072 4168 fotos de muestras de productos pdf.exe DpiScaling.exe PID 4168 wrote to memory of 4072 4168 fotos de muestras de productos pdf.exe DpiScaling.exe PID 4168 wrote to memory of 4072 4168 fotos de muestras de productos pdf.exe DpiScaling.exe PID 4168 wrote to memory of 4072 4168 fotos de muestras de productos pdf.exe DpiScaling.exe PID 4168 wrote to memory of 4072 4168 fotos de muestras de productos pdf.exe DpiScaling.exe PID 3048 wrote to memory of 2592 3048 Explorer.EXE explorer.exe PID 3048 wrote to memory of 2592 3048 Explorer.EXE explorer.exe PID 3048 wrote to memory of 2592 3048 Explorer.EXE explorer.exe PID 2592 wrote to memory of 4344 2592 explorer.exe cmd.exe PID 2592 wrote to memory of 4344 2592 explorer.exe cmd.exe PID 2592 wrote to memory of 4344 2592 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fotos de muestras de productos pdf.exe"C:\Users\Admin\AppData\Local\Temp\fotos de muestras de productos pdf.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\DpiScaling.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2592-123-0x0000000000000000-mapping.dmp
-
memory/2592-128-0x0000000004BE0000-0x0000000004C73000-memory.dmpFilesize
588KB
-
memory/2592-127-0x0000000004E70000-0x0000000005190000-memory.dmpFilesize
3.1MB
-
memory/2592-125-0x00000000007A0000-0x00000000007CE000-memory.dmpFilesize
184KB
-
memory/2592-124-0x00000000009C0000-0x0000000000DFF000-memory.dmpFilesize
4.2MB
-
memory/3048-122-0x00000000049F0000-0x0000000004B49000-memory.dmpFilesize
1.3MB
-
memory/3048-129-0x0000000004B50000-0x0000000004CC9000-memory.dmpFilesize
1.5MB
-
memory/4072-120-0x00000000049C0000-0x0000000004CE0000-memory.dmpFilesize
3.1MB
-
memory/4072-121-0x0000000004600000-0x0000000004614000-memory.dmpFilesize
80KB
-
memory/4072-119-0x0000000010410000-0x000000001043E000-memory.dmpFilesize
184KB
-
memory/4072-118-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/4072-117-0x0000000000000000-mapping.dmp
-
memory/4168-115-0x0000000000650000-0x0000000000651000-memory.dmpFilesize
4KB
-
memory/4344-126-0x0000000000000000-mapping.dmp