Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
23-10-2021 07:47
Static task
static1
Behavioral task
behavioral1
Sample
196666c8.exe
Resource
win7-en-20210920
General
-
Target
196666c8.exe
-
Size
394KB
-
MD5
c0774667c40bc1a34b22fe4afdf3d87c
-
SHA1
750efb48dea98d15bf740aa357eed6235caa2187
-
SHA256
196666c85a31dedff03cdc9a8e19c323f510f7d1b55301463a21cb969751a700
-
SHA512
18687d1dbe2657c5e8237fa71b32f9de2fd4944713e874303312d6194eec3758ccef760c8a86d50aa8966abe20357f86b3ae24fa004da824072a0304eff66829
Malware Config
Extracted
formbook
4.1
s0vc
http://www.xn--289an7fmsbe2rud327e.com/s0vc/
redstonemanagers.com
graffitiparktx.com
aliturk.com
asicsmalaysiasale.com
primetimehandyman.com
logjed068.xyz
rusicedream.com
rickcaronmuseum.com
softwarebuynow.com
buddysbarkery.com
ysm99.com
rtetrgwgre.xyz
97020.xyz
utahblind.site
hiyym.com
rohukager.xyz
vcstudentwork.com
oxfordautomotivepa.com
salibrown.com
tekosocks.com
creekincrystals.com
clairewashere.site
emiratli.xyz
eusoufernandorocha.com
regionalleadmap.guide
firstselectindia.com
megamodamaster.com
ritmicatop.com
hextellconstructions.com
axismath.com
tadowequsotot.rest
hw0745.com
a-great-online-mba-es-lagdn.fyi
nazlialisverissitesi.com
bolacn.com
thegroundknowledge.com
brooksuper.com
readyneed.net
gentciu.com
trywelles.website
colab.farm
taylormadedfwhometeam.net
gosh-opium.club
hayyjameel.cloud
898192.com
pwnedpasswordsnft.com
pastormarkusgh.com
toonkor.golf
ambientmusicartist.com
chrisforjp.com
shzd2.com
lonestarbiologics.com
thinktimelogisticsllc.com
472291.com
heidoulife.com
lisamf.xyz
captainamberbeard.net
csishj.com
perfectnethost.com
abovethebarn.net
everhuntingabandon.xyz
satima.net
xn--jj0bs99byvj.com
smitheating.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1480-58-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1480-59-0x000000000041F160-mapping.dmp formbook behavioral1/memory/668-68-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 396 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
196666c8.exe196666c8.execscript.exedescription pid process target process PID 1564 set thread context of 1480 1564 196666c8.exe 196666c8.exe PID 1480 set thread context of 1264 1480 196666c8.exe Explorer.EXE PID 668 set thread context of 1264 668 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
196666c8.exe196666c8.execscript.exepid process 1564 196666c8.exe 1480 196666c8.exe 1480 196666c8.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe 668 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
196666c8.execscript.exepid process 1480 196666c8.exe 1480 196666c8.exe 1480 196666c8.exe 668 cscript.exe 668 cscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
196666c8.exe196666c8.execscript.exedescription pid process Token: SeDebugPrivilege 1564 196666c8.exe Token: SeDebugPrivilege 1480 196666c8.exe Token: SeDebugPrivilege 668 cscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
196666c8.exeExplorer.EXEcscript.exedescription pid process target process PID 1564 wrote to memory of 1464 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1464 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1464 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1464 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1480 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1480 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1480 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1480 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1480 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1480 1564 196666c8.exe 196666c8.exe PID 1564 wrote to memory of 1480 1564 196666c8.exe 196666c8.exe PID 1264 wrote to memory of 668 1264 Explorer.EXE cscript.exe PID 1264 wrote to memory of 668 1264 Explorer.EXE cscript.exe PID 1264 wrote to memory of 668 1264 Explorer.EXE cscript.exe PID 1264 wrote to memory of 668 1264 Explorer.EXE cscript.exe PID 668 wrote to memory of 396 668 cscript.exe cmd.exe PID 668 wrote to memory of 396 668 cscript.exe cmd.exe PID 668 wrote to memory of 396 668 cscript.exe cmd.exe PID 668 wrote to memory of 396 668 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\196666c8.exe"C:\Users\Admin\AppData\Local\Temp\196666c8.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\196666c8.exe"C:\Users\Admin\AppData\Local\Temp\196666c8.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\196666c8.exe"C:\Users\Admin\AppData\Local\Temp\196666c8.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\196666c8.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/396-69-0x0000000000000000-mapping.dmp
-
memory/668-70-0x0000000000560000-0x00000000005F3000-memory.dmpFilesize
588KB
-
memory/668-68-0x0000000000070000-0x000000000009F000-memory.dmpFilesize
188KB
-
memory/668-67-0x0000000002130000-0x0000000002433000-memory.dmpFilesize
3.0MB
-
memory/668-66-0x00000000004E0000-0x0000000000502000-memory.dmpFilesize
136KB
-
memory/668-65-0x0000000000000000-mapping.dmp
-
memory/1264-64-0x0000000006CE0000-0x0000000006DF7000-memory.dmpFilesize
1.1MB
-
memory/1264-71-0x0000000006E00000-0x0000000006F0D000-memory.dmpFilesize
1.1MB
-
memory/1480-58-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1480-63-0x0000000000280000-0x0000000000294000-memory.dmpFilesize
80KB
-
memory/1480-62-0x0000000000B90000-0x0000000000E93000-memory.dmpFilesize
3.0MB
-
memory/1480-59-0x000000000041F160-mapping.dmp
-
memory/1480-57-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1480-56-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1564-61-0x0000000002111000-0x0000000002112000-memory.dmpFilesize
4KB
-
memory/1564-54-0x0000000075821000-0x0000000075823000-memory.dmpFilesize
8KB
-
memory/1564-55-0x0000000002110000-0x0000000002111000-memory.dmpFilesize
4KB