Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
29-10-2021 11:36
Static task
static1
Behavioral task
behavioral1
Sample
PO4809217226898789.pdf.exe
Resource
win7-en-20211014
General
-
Target
PO4809217226898789.pdf.exe
-
Size
347KB
-
MD5
e3d87c2d533796d8a78793bf4ef179ec
-
SHA1
7855d161dc42e4a0936f71274c9142950fc542c8
-
SHA256
f40c731716d135ea7e583819570a83d92e24c3dfb2a3b0ac375bd97774ffd689
-
SHA512
b4af236df96ad68bac6cc0522de034083c5b49d295bff8c1c83223ba1d137dfae48601ec443f346c1f672846dd8f58124d6c076be85b736060e083ee12725812
Malware Config
Extracted
formbook
4.1
gr1c
http://www.illusiontrick.com/gr1c/
soakyourgrains.com
duwego.com
aenkdesign.com
bikabbziu.xyz
thesawyerlegacy.com
koreanmodelbj.xyz
exceed-standards.com
syirsve.com
sachisushimontreal.com
thegalwaykitchen.com
accarwash-hub.com
connectwithmentor.com
luftfundament.online
ibrahimkaracan.com
biggersinsurance.com
desellon.com
tvnewscloset.com
digital-dre.com
ingocg.com
fernanda-ortiz.com
globallbazar.com
goldballoons.com
save-insta.net
jr-cons.com
ahyaqing.com
dawoodkhalil.com
paris-moi.com
pitchnft.net
shopdivastore.com
clarksclumpiesforkids.com
boutiquedulinge.com
tephineproperties.com
536484.com
testbegetregainfo.info
descontazzo.com
complioso.com
cashvax.xyz
bezeqimt.net
niqi666.com
daqishoes.com
uichin.info
boostarassa.quest
tarrings.info
caringhearts.one
untouchableinnovations.com
raymondcase.com
trippyhippieinc.com
fischernude.top
mazurschool.com
fswde.online
boldlarentals.com
welmovs.xyz
bandardunia.xyz
9594851.com
jioi.top
brequity.com
krakennewhour.com
polyteq.net
033xj.com
066ss.xyz
aluthgossip.xyz
grandezapura.com
kenneth-p.online
dadsaman.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1516-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1516-65-0x000000000041F0B0-mapping.dmp formbook behavioral1/memory/1804-72-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1104 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO4809217226898789.pdf.exePO4809217226898789.pdf.exechkdsk.exedescription pid process target process PID 676 set thread context of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 1516 set thread context of 1272 1516 PO4809217226898789.pdf.exe Explorer.EXE PID 1804 set thread context of 1272 1804 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
PO4809217226898789.pdf.exePO4809217226898789.pdf.exechkdsk.exepid process 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 676 PO4809217226898789.pdf.exe 1516 PO4809217226898789.pdf.exe 1516 PO4809217226898789.pdf.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe 1804 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PO4809217226898789.pdf.exechkdsk.exepid process 1516 PO4809217226898789.pdf.exe 1516 PO4809217226898789.pdf.exe 1516 PO4809217226898789.pdf.exe 1804 chkdsk.exe 1804 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO4809217226898789.pdf.exePO4809217226898789.pdf.exechkdsk.exedescription pid process Token: SeDebugPrivilege 676 PO4809217226898789.pdf.exe Token: SeDebugPrivilege 1516 PO4809217226898789.pdf.exe Token: SeDebugPrivilege 1804 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
PO4809217226898789.pdf.exeExplorer.EXEchkdsk.exedescription pid process target process PID 676 wrote to memory of 1056 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1056 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1056 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1056 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 676 wrote to memory of 1516 676 PO4809217226898789.pdf.exe PO4809217226898789.pdf.exe PID 1272 wrote to memory of 1804 1272 Explorer.EXE chkdsk.exe PID 1272 wrote to memory of 1804 1272 Explorer.EXE chkdsk.exe PID 1272 wrote to memory of 1804 1272 Explorer.EXE chkdsk.exe PID 1272 wrote to memory of 1804 1272 Explorer.EXE chkdsk.exe PID 1804 wrote to memory of 1104 1804 chkdsk.exe cmd.exe PID 1804 wrote to memory of 1104 1804 chkdsk.exe cmd.exe PID 1804 wrote to memory of 1104 1804 chkdsk.exe cmd.exe PID 1804 wrote to memory of 1104 1804 chkdsk.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO4809217226898789.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO4809217226898789.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO4809217226898789.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO4809217226898789.pdf.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\PO4809217226898789.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO4809217226898789.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO4809217226898789.pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/676-55-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/676-57-0x0000000075C21000-0x0000000075C23000-memory.dmpFilesize
8KB
-
memory/676-58-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/676-59-0x0000000000690000-0x0000000000697000-memory.dmpFilesize
28KB
-
memory/676-60-0x000000007EF40000-0x000000007EF41000-memory.dmpFilesize
4KB
-
memory/676-61-0x0000000002200000-0x0000000002250000-memory.dmpFilesize
320KB
-
memory/1104-73-0x0000000000000000-mapping.dmp
-
memory/1272-76-0x0000000007C60000-0x0000000007DD0000-memory.dmpFilesize
1.4MB
-
memory/1272-69-0x0000000006AF0000-0x0000000006BF3000-memory.dmpFilesize
1.0MB
-
memory/1516-67-0x0000000000940000-0x0000000000C43000-memory.dmpFilesize
3.0MB
-
memory/1516-65-0x000000000041F0B0-mapping.dmp
-
memory/1516-68-0x0000000000200000-0x0000000000214000-memory.dmpFilesize
80KB
-
memory/1516-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1516-64-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1516-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1804-70-0x0000000000000000-mapping.dmp
-
memory/1804-72-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/1804-71-0x0000000000DC0000-0x0000000000DC7000-memory.dmpFilesize
28KB
-
memory/1804-74-0x00000000021D0000-0x00000000024D3000-memory.dmpFilesize
3.0MB
-
memory/1804-75-0x00000000009B0000-0x0000000000A43000-memory.dmpFilesize
588KB