Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
19-10-2021 02:18
Static task
static1
Behavioral task
behavioral1
Sample
AWB##29721.PDF.exe
Resource
win7-en-20211014
General
-
Target
AWB##29721.PDF.exe
-
Size
461KB
-
MD5
6244f4e218cef1f89dbe0a96374d5eaa
-
SHA1
d6d8c3c4a7e9f777b9c4383120b057be18a4ad41
-
SHA256
9404982e0cf941d6103e40246a6689d91be00c03c8d9072e42ebf56bd9080492
-
SHA512
bf8c0c36444aedf8033b636121fd18e2c6ec417ccd56ca528bd3b71c3b71dc5c330c6018c30822c5e33e5d833a863e1a219f9881dd98caf53ba78616ec1a4736
Malware Config
Extracted
formbook
4.1
gr1c
http://www.illusiontrick.com/gr1c/
soakyourgrains.com
duwego.com
aenkdesign.com
bikabbziu.xyz
thesawyerlegacy.com
koreanmodelbj.xyz
exceed-standards.com
syirsve.com
sachisushimontreal.com
thegalwaykitchen.com
accarwash-hub.com
connectwithmentor.com
luftfundament.online
ibrahimkaracan.com
biggersinsurance.com
desellon.com
tvnewscloset.com
digital-dre.com
ingocg.com
fernanda-ortiz.com
globallbazar.com
goldballoons.com
save-insta.net
jr-cons.com
ahyaqing.com
dawoodkhalil.com
paris-moi.com
pitchnft.net
shopdivastore.com
clarksclumpiesforkids.com
boutiquedulinge.com
tephineproperties.com
536484.com
testbegetregainfo.info
descontazzo.com
complioso.com
cashvax.xyz
bezeqimt.net
niqi666.com
daqishoes.com
uichin.info
boostarassa.quest
tarrings.info
caringhearts.one
untouchableinnovations.com
raymondcase.com
trippyhippieinc.com
fischernude.top
mazurschool.com
fswde.online
boldlarentals.com
welmovs.xyz
bandardunia.xyz
9594851.com
jioi.top
brequity.com
krakennewhour.com
polyteq.net
033xj.com
066ss.xyz
aluthgossip.xyz
grandezapura.com
kenneth-p.online
dadsaman.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2612-117-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2612-118-0x000000000041F0B0-mapping.dmp formbook behavioral2/memory/2540-127-0x0000000000580000-0x00000000005AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
AWB##29721.PDF.exeAWB##29721.PDF.exemsiexec.exedescription pid process target process PID 3684 set thread context of 2612 3684 AWB##29721.PDF.exe AWB##29721.PDF.exe PID 2612 set thread context of 3020 2612 AWB##29721.PDF.exe Explorer.EXE PID 2540 set thread context of 3020 2540 msiexec.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
AWB##29721.PDF.exeAWB##29721.PDF.exemsiexec.exepid process 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 3684 AWB##29721.PDF.exe 2612 AWB##29721.PDF.exe 2612 AWB##29721.PDF.exe 2612 AWB##29721.PDF.exe 2612 AWB##29721.PDF.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe 2540 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
AWB##29721.PDF.exemsiexec.exepid process 2612 AWB##29721.PDF.exe 2612 AWB##29721.PDF.exe 2612 AWB##29721.PDF.exe 2540 msiexec.exe 2540 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AWB##29721.PDF.exeAWB##29721.PDF.exemsiexec.exedescription pid process Token: SeDebugPrivilege 3684 AWB##29721.PDF.exe Token: SeDebugPrivilege 2612 AWB##29721.PDF.exe Token: SeDebugPrivilege 2540 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
AWB##29721.PDF.exeExplorer.EXEmsiexec.exedescription pid process target process PID 3684 wrote to memory of 2612 3684 AWB##29721.PDF.exe AWB##29721.PDF.exe PID 3684 wrote to memory of 2612 3684 AWB##29721.PDF.exe AWB##29721.PDF.exe PID 3684 wrote to memory of 2612 3684 AWB##29721.PDF.exe AWB##29721.PDF.exe PID 3684 wrote to memory of 2612 3684 AWB##29721.PDF.exe AWB##29721.PDF.exe PID 3684 wrote to memory of 2612 3684 AWB##29721.PDF.exe AWB##29721.PDF.exe PID 3684 wrote to memory of 2612 3684 AWB##29721.PDF.exe AWB##29721.PDF.exe PID 3020 wrote to memory of 2540 3020 Explorer.EXE msiexec.exe PID 3020 wrote to memory of 2540 3020 Explorer.EXE msiexec.exe PID 3020 wrote to memory of 2540 3020 Explorer.EXE msiexec.exe PID 2540 wrote to memory of 592 2540 msiexec.exe cmd.exe PID 2540 wrote to memory of 592 2540 msiexec.exe cmd.exe PID 2540 wrote to memory of 592 2540 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AWB##29721.PDF.exe"C:\Users\Admin\AppData\Local\Temp\AWB##29721.PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AWB##29721.PDF.exe"C:\Users\Admin\AppData\Local\Temp\AWB##29721.PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AWB##29721.PDF.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/592-129-0x0000000000000000-mapping.dmp
-
memory/2540-128-0x0000000004700000-0x0000000004A20000-memory.dmpFilesize
3.1MB
-
memory/2540-126-0x00000000008C0000-0x00000000008D2000-memory.dmpFilesize
72KB
-
memory/2540-130-0x00000000044D0000-0x0000000004563000-memory.dmpFilesize
588KB
-
memory/2540-125-0x0000000000490000-0x0000000000491000-memory.dmpFilesize
4KB
-
memory/2540-127-0x0000000000580000-0x00000000005AF000-memory.dmpFilesize
188KB
-
memory/2540-123-0x0000000000000000-mapping.dmp
-
memory/2540-124-0x0000000000490000-0x0000000000491000-memory.dmpFilesize
4KB
-
memory/2612-117-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2612-120-0x0000000001330000-0x0000000001650000-memory.dmpFilesize
3.1MB
-
memory/2612-121-0x0000000001840000-0x0000000001854000-memory.dmpFilesize
80KB
-
memory/2612-118-0x000000000041F0B0-mapping.dmp
-
memory/3020-122-0x0000000005CA0000-0x0000000005E28000-memory.dmpFilesize
1.5MB
-
memory/3020-131-0x00000000024E0000-0x00000000025BA000-memory.dmpFilesize
872KB
-
memory/3684-115-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/3684-116-0x0000000002761000-0x0000000002762000-memory.dmpFilesize
4KB