Analysis
-
max time kernel
106s -
max time network
24s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
30-09-2021 11:02
Static task
static1
Behavioral task
behavioral1
Sample
New order and image.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
New order and image.exe
Resource
win10v20210408
General
-
Target
New order and image.exe
-
Size
326KB
-
MD5
d7dd8868b5318b516d22930a624d096d
-
SHA1
4a01fcbced1e4234bfd10ea8980b6c65684f3b28
-
SHA256
218a43f5f1a1bb3a7974fe8fd0532829b1b858dec3c8d6bc2a5835a6bb735321
-
SHA512
1f93982b39ff3142c7248bfd5c4ffe3d05ecb4d8a0f0a89edd0f22d96bb9d2eaa1af6420623458cafd29a50d6388f829a9e931cd93bc8a594464aa0ac5071ff8
Malware Config
Extracted
formbook
4.1
dn7r
http://www.yourherogarden.net/dn7r/
eventphotographerdfw.com
thehalalcoinstaking.com
philipfaziofineart.com
intercoh.com
gaiaseyephotography.com
chatbotforrealestate.com
lovelancemg.com
marlieskasberger.com
elcongoenespanol.info
lepirecredit.com
distribution-concept.com
e99game.com
exit11festival.com
twodollartoothbrushclub.com
cocktailsandlawn.com
performimprove.network
24horas-telefono-11840.com
cosmossify.com
kellenleote.com
perovskite.energy
crosschain.services
xiwanghe.com
mollycayton.com
bonipay.com
uuwyxc.com
viberiokno-online.com
mobceo.com
menzelna.com
tiffaniefoster.com
premiumautowesthartford.com
ownhome.house
bestmartinshop.com
splashstoreofficial.com
guidemining.com
ecshopdemo.com
bestprinting1.com
s-circle2020.com
ncagency.info
easydigitalzone.com
reikiforthecollective.com
theknottteam.com
evolvedpixel.com
japxo.online
ryansqualityrenovations.com
dentimagenquito.net
pantherprints.co.uk
apoporangi.com
thietkemietvuon.net
ifernshop.com
casaruralesgranada.com
camp-3saumons.com
eddsucks.com
blwcd.com
deldlab.com
susanperb.com
autosanitizingsolutions.com
femhouse.com
ironcageclash.com
thekinghealer.com
shaghayeghbovand.com
advertfaces.com
lonriley.com
mased-world.online
mythicspacex.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1080-55-0x0000000000400000-0x0000000000881000-memory.dmp formbook behavioral1/memory/1080-54-0x0000000000250000-0x000000000027F000-memory.dmp formbook behavioral1/memory/612-57-0x0000000000200000-0x0000000000260000-memory.dmp formbook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 612 1080 WerFault.exe New order and image.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 612 WerFault.exe 612 WerFault.exe 612 WerFault.exe 612 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 612 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 612 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
New order and image.exedescription pid process target process PID 1080 wrote to memory of 612 1080 New order and image.exe WerFault.exe PID 1080 wrote to memory of 612 1080 New order and image.exe WerFault.exe PID 1080 wrote to memory of 612 1080 New order and image.exe WerFault.exe PID 1080 wrote to memory of 612 1080 New order and image.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New order and image.exe"C:\Users\Admin\AppData\Local\Temp\New order and image.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/612-53-0x0000000000000000-mapping.dmp
-
memory/612-56-0x0000000075FC1000-0x0000000075FC3000-memory.dmpFilesize
8KB
-
memory/612-57-0x0000000000200000-0x0000000000260000-memory.dmpFilesize
384KB
-
memory/1080-55-0x0000000000400000-0x0000000000881000-memory.dmpFilesize
4.5MB
-
memory/1080-54-0x0000000000250000-0x000000000027F000-memory.dmpFilesize
188KB