Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
08-10-2021 11:45
Static task
static1
Behavioral task
behavioral1
Sample
Untitled attachment 00032.exe
Resource
win7-en-20210920
General
-
Target
Untitled attachment 00032.exe
-
Size
774KB
-
MD5
4409e2201e897419028a58a9d41e1e69
-
SHA1
41f62fb8e11de4e2b93a05cb806dc5574b40ae99
-
SHA256
0b2d1bf2ca75ec2f3db69659158e685cec6efb71e4be9e277af99b3ad0508c11
-
SHA512
5dc4acedbbc631fb460027ac966f22cc0d34c0f7dc673a48bff73d5fcffd87a691c4ef2204ee7d0e0343b6e9daac3f6c008c8f36f36e255dd8ae331dacd0744c
Malware Config
Extracted
formbook
4.1
n7ak
http://www.kmresults.com/n7ak/
modischoolcbse.com
theneverwinter.com
rszkjx-vps-hosting.website
fnihil.com
1pbet.com
nnowzscorrez.com
uaotgvjl.icu
starmapsqatar.com
ekisilani.com
extradeepsheets.com
jam-nins.com
buranly.com
orixentertainment.com
rawtech.energy
myol.guru
utex.club
jiapie.com
wowig.store
wweidlyyl.com
systaskautomation.com
citromudas3a.com
plasticstone.icu
pawchamamapet.com
beautybybby.com
mor-n-mor.com
getoffyourhighhorses.com
chieucaochoban9.xyz
grahamevansmp.com
amplaassessoria.net
nutricookindia.com
wazymbex.icu
joansironing.com
hallforless.com
mycourseprofits.com
precps.com
cookislandstourismpodcast.com
bestonlinedealslive.com
bug.chat
ptjbtoqonjtrwpvkfgmjvwp.com
tortniespodzianka.store
qxkbjgj.icu
aurashape.com
guinealive.com
mondialeresources.com
offthebreak.site
maxamproductivity.com
thebiztip.com
thelocalrea.com
laeducacionadistancia.com
inpakgroup.com
lvgang360.com
allvegangoods.com
tymudanzaramos.com
simpleframeswork.com
thehappycars.com
directfenetres.net
norskatferdsterapi.com
hostingcnx.com
ksmh5x.com
thespiritworldinvitational.com
jetsetwilly3.com
gameflexdev.com
tryhuge.com
vaporvspaper.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/848-59-0x0000000000000000-mapping.dmp formbook behavioral1/memory/848-63-0x0000000072480000-0x00000000724AE000-memory.dmp formbook behavioral1/memory/1096-69-0x00000000000C0000-0x00000000000EE000-memory.dmp formbook -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Untitled attachment 00032.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wilbwux = "C:\\Users\\Public\\Libraries\\xuwbliW.url" Untitled attachment 00032.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
mobsync.exeNAPSTAT.EXEdescription pid process target process PID 848 set thread context of 1268 848 mobsync.exe Explorer.EXE PID 1096 set thread context of 1268 1096 NAPSTAT.EXE Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
mobsync.exeNAPSTAT.EXEpid process 848 mobsync.exe 848 mobsync.exe 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
mobsync.exeNAPSTAT.EXEpid process 848 mobsync.exe 848 mobsync.exe 848 mobsync.exe 1096 NAPSTAT.EXE 1096 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
mobsync.exeNAPSTAT.EXEdescription pid process Token: SeDebugPrivilege 848 mobsync.exe Token: SeDebugPrivilege 1096 NAPSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Untitled attachment 00032.exeExplorer.EXENAPSTAT.EXEdescription pid process target process PID 1144 wrote to memory of 848 1144 Untitled attachment 00032.exe mobsync.exe PID 1144 wrote to memory of 848 1144 Untitled attachment 00032.exe mobsync.exe PID 1144 wrote to memory of 848 1144 Untitled attachment 00032.exe mobsync.exe PID 1144 wrote to memory of 848 1144 Untitled attachment 00032.exe mobsync.exe PID 1144 wrote to memory of 848 1144 Untitled attachment 00032.exe mobsync.exe PID 1144 wrote to memory of 848 1144 Untitled attachment 00032.exe mobsync.exe PID 1144 wrote to memory of 848 1144 Untitled attachment 00032.exe mobsync.exe PID 1268 wrote to memory of 1096 1268 Explorer.EXE NAPSTAT.EXE PID 1268 wrote to memory of 1096 1268 Explorer.EXE NAPSTAT.EXE PID 1268 wrote to memory of 1096 1268 Explorer.EXE NAPSTAT.EXE PID 1268 wrote to memory of 1096 1268 Explorer.EXE NAPSTAT.EXE PID 1096 wrote to memory of 1536 1096 NAPSTAT.EXE cmd.exe PID 1096 wrote to memory of 1536 1096 NAPSTAT.EXE cmd.exe PID 1096 wrote to memory of 1536 1096 NAPSTAT.EXE cmd.exe PID 1096 wrote to memory of 1536 1096 NAPSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Untitled attachment 00032.exe"C:\Users\Admin\AppData\Local\Temp\Untitled attachment 00032.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mobsync.exeC:\Windows\System32\mobsync.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\mobsync.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/848-65-0x00000000001B0000-0x00000000001C4000-memory.dmpFilesize
80KB
-
memory/848-62-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/848-64-0x0000000002110000-0x0000000002413000-memory.dmpFilesize
3.0MB
-
memory/848-56-0x0000000072480000-0x00000000724AE000-memory.dmpFilesize
184KB
-
memory/848-57-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/848-59-0x0000000000000000-mapping.dmp
-
memory/848-63-0x0000000072480000-0x00000000724AE000-memory.dmpFilesize
184KB
-
memory/1096-68-0x0000000000640000-0x0000000000686000-memory.dmpFilesize
280KB
-
memory/1096-67-0x0000000000000000-mapping.dmp
-
memory/1096-69-0x00000000000C0000-0x00000000000EE000-memory.dmpFilesize
184KB
-
memory/1096-70-0x0000000001ED0000-0x00000000021D3000-memory.dmpFilesize
3.0MB
-
memory/1096-72-0x0000000001D90000-0x0000000001E23000-memory.dmpFilesize
588KB
-
memory/1144-55-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1144-54-0x0000000001CC1000-0x0000000001CD5000-memory.dmpFilesize
80KB
-
memory/1144-53-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/1268-73-0x0000000006B90000-0x0000000006D1D000-memory.dmpFilesize
1.6MB
-
memory/1268-66-0x0000000004A50000-0x0000000004B4A000-memory.dmpFilesize
1000KB
-
memory/1536-71-0x0000000000000000-mapping.dmp