Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-11-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe
Resource
win7-en-20211014
General
-
Target
S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe
-
Size
448KB
-
MD5
78be75029064bfcd03eedce61e018d9b
-
SHA1
5b9594d4dc4c46d5479ed5645ba1aa510e403ec3
-
SHA256
7dd2cb6cb441739419634c8a5aedbd44fc20357fe1c861924b3199e5f4e351ba
-
SHA512
256433af256e230521998b0bf48921f4ccb6cf4d113409b4678c0c36709c431dcb257b01f0d8842a041447e117bf070cef9b300975d24793b1a52525dcc16547
Malware Config
Extracted
formbook
4.1
cnp0
http://www.ccnsv.net/cnp0/
jiarenyuanhunlian.com
xquizitelashesnwaxx.com
rentinerie.com
herbalpedia-id.com
openseagames.com
re-swap.com
william-cook.com
segensv.com
versebay.com
brendanlairdsound.com
bypestor.com
hospitaldelpc.net
wwwroadrunnerfinancial.com
waterhammerstudios.com
hustleandbank.photography
secure01bchslogin.com
rarepeperanking.com
greatland.company
happybirthdayjewel.com
raheok.store
citrusarrow.coffee
midwest-oktoberfest.com
dpcuow.com
creativeartsfilmacademy.biz
sse-audio.com
offertasuperfibra.com
gizpsikolojikdanisma.com
7aomoquzb9.com
filthycarproductions.online
fuquba.com
lovinzion.com
istanbulmadencilik.com
treasuretroveofrecipes.com
exploitporbrl.xyz
seneorreward.com
sx-mz.com
mylcsservices.digital
paidimage.xyz
tayyqc.com
congoqueen.com
cerrajerovalls.online
iwasehokenservice.net
chuahoinach.net
savouri.online
brandonjanisieski.com
seo-clicks7.com
aplusvibe.com
incotporate.com
webdyx.com
pit.land
sdnfmrmi.com
skinbluecap.com
maestractiva.com
tianshunhong.com
maddenconstance.com
wonderkdesign.com
keycuracao.com
lebzcl.com
toriyabeblog.com
clicksfrog.com
the22yards.club
peakprocesssolutions.com
sustainabilityreview.com
onceuponawreathde.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2088-124-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2088-125-0x000000000041F0D0-mapping.dmp formbook behavioral2/memory/2088-128-0x0000000001440000-0x000000000158A000-memory.dmp formbook behavioral2/memory/1184-133-0x0000000000760000-0x000000000078F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exeS.K TRADING CO., LTD - INQUIRY DOCUMENTS.execscript.exedescription pid process target process PID 3168 set thread context of 2088 3168 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe PID 2088 set thread context of 3024 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe Explorer.EXE PID 1184 set thread context of 3024 1184 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
S.K TRADING CO., LTD - INQUIRY DOCUMENTS.execscript.exepid process 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe 1184 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3024 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
S.K TRADING CO., LTD - INQUIRY DOCUMENTS.execscript.exepid process 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe 1184 cscript.exe 1184 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
S.K TRADING CO., LTD - INQUIRY DOCUMENTS.execscript.exedescription pid process Token: SeDebugPrivilege 2088 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe Token: SeDebugPrivilege 1184 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exeExplorer.EXEcscript.exedescription pid process target process PID 3168 wrote to memory of 2088 3168 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe PID 3168 wrote to memory of 2088 3168 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe PID 3168 wrote to memory of 2088 3168 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe PID 3168 wrote to memory of 2088 3168 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe PID 3168 wrote to memory of 2088 3168 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe PID 3168 wrote to memory of 2088 3168 S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe PID 3024 wrote to memory of 1184 3024 Explorer.EXE cscript.exe PID 3024 wrote to memory of 1184 3024 Explorer.EXE cscript.exe PID 3024 wrote to memory of 1184 3024 Explorer.EXE cscript.exe PID 1184 wrote to memory of 2848 1184 cscript.exe cmd.exe PID 1184 wrote to memory of 2848 1184 cscript.exe cmd.exe PID 1184 wrote to memory of 2848 1184 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe"C:\Users\Admin\AppData\Local\Temp\S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe"C:\Users\Admin\AppData\Local\Temp\S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\S.K TRADING CO., LTD - INQUIRY DOCUMENTS.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1184-130-0x0000000000000000-mapping.dmp
-
memory/1184-135-0x0000000004640000-0x00000000046D3000-memory.dmpFilesize
588KB
-
memory/1184-133-0x0000000000760000-0x000000000078F000-memory.dmpFilesize
188KB
-
memory/1184-131-0x0000000001110000-0x0000000001137000-memory.dmpFilesize
156KB
-
memory/1184-132-0x0000000004880000-0x0000000004BA0000-memory.dmpFilesize
3.1MB
-
memory/2088-128-0x0000000001440000-0x000000000158A000-memory.dmpFilesize
1.3MB
-
memory/2088-127-0x0000000001880000-0x0000000001BA0000-memory.dmpFilesize
3.1MB
-
memory/2088-124-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2088-125-0x000000000041F0D0-mapping.dmp
-
memory/2848-134-0x0000000000000000-mapping.dmp
-
memory/3024-129-0x0000000002450000-0x0000000002504000-memory.dmpFilesize
720KB
-
memory/3024-136-0x0000000005D00000-0x0000000005E32000-memory.dmpFilesize
1.2MB
-
memory/3168-115-0x0000000000DB0000-0x0000000000DB1000-memory.dmpFilesize
4KB
-
memory/3168-122-0x0000000006450000-0x0000000006451000-memory.dmpFilesize
4KB
-
memory/3168-121-0x00000000058C0000-0x00000000058C6000-memory.dmpFilesize
24KB
-
memory/3168-120-0x00000000055C0000-0x0000000005652000-memory.dmpFilesize
584KB
-
memory/3168-119-0x0000000005670000-0x0000000005671000-memory.dmpFilesize
4KB
-
memory/3168-118-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/3168-123-0x00000000064F0000-0x0000000006542000-memory.dmpFilesize
328KB
-
memory/3168-117-0x0000000005BB0000-0x0000000005BB1000-memory.dmpFilesize
4KB