Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
29-09-2021 12:03
Static task
static1
Behavioral task
behavioral1
Sample
COMMANDE EN VRAC.exe
Resource
win7v20210408
General
-
Target
COMMANDE EN VRAC.exe
-
Size
294KB
-
MD5
cb98b8cb0d393f8139a8b472e1df64f1
-
SHA1
f57893ee437446d4fb40e6a0642d1cf05965fb72
-
SHA256
bbedcbe77cff074e73d9265b5cd4dfaba57b573065b1cb36e7944880a54239e9
-
SHA512
7f3414181e779202cad55f689cec2b0b5d9c4b5904cbbdd7548941149b217f5e26e28c7f3191bd5457627813ad1d53a6d70b90158d7ac73f394f88dbccab4178
Malware Config
Extracted
formbook
4.1
dn7r
http://www.yourherogarden.net/dn7r/
eventphotographerdfw.com
thehalalcoinstaking.com
philipfaziofineart.com
intercoh.com
gaiaseyephotography.com
chatbotforrealestate.com
lovelancemg.com
marlieskasberger.com
elcongoenespanol.info
lepirecredit.com
distribution-concept.com
e99game.com
exit11festival.com
twodollartoothbrushclub.com
cocktailsandlawn.com
performimprove.network
24horas-telefono-11840.com
cosmossify.com
kellenleote.com
perovskite.energy
crosschain.services
xiwanghe.com
mollycayton.com
bonipay.com
uuwyxc.com
viberiokno-online.com
mobceo.com
menzelna.com
tiffaniefoster.com
premiumautowesthartford.com
ownhome.house
bestmartinshop.com
splashstoreofficial.com
guidemining.com
ecshopdemo.com
bestprinting1.com
s-circle2020.com
ncagency.info
easydigitalzone.com
reikiforthecollective.com
theknottteam.com
evolvedpixel.com
japxo.online
ryansqualityrenovations.com
dentimagenquito.net
pantherprints.co.uk
apoporangi.com
thietkemietvuon.net
ifernshop.com
casaruralesgranada.com
camp-3saumons.com
eddsucks.com
blwcd.com
deldlab.com
susanperb.com
autosanitizingsolutions.com
femhouse.com
ironcageclash.com
thekinghealer.com
shaghayeghbovand.com
advertfaces.com
lonriley.com
mased-world.online
mythicspacex.com
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2808 created 3704 2808 WerFault.exe COMMANDE EN VRAC.exe -
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3704-115-0x00000000005B0000-0x00000000005DF000-memory.dmp formbook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2808 3704 WerFault.exe COMMANDE EN VRAC.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2808 WerFault.exe Token: SeBackupPrivilege 2808 WerFault.exe Token: SeDebugPrivilege 2808 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMMANDE EN VRAC.exe"C:\Users\Admin\AppData\Local\Temp\COMMANDE EN VRAC.exe"1⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 2482⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3704-115-0x00000000005B0000-0x00000000005DF000-memory.dmpFilesize
188KB