Analysis
-
max time kernel
147s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
04-01-2022 16:06
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA DE PROFORMA PDF.exe
Resource
win7-en-20211208
General
-
Target
FACTURA DE PROFORMA PDF.exe
-
Size
712KB
-
MD5
5827a80cfb204906f2ca19ef835c0b0f
-
SHA1
e8334cb029d265899092e56d76373f6e021d7622
-
SHA256
6ceb475f1ce2d253425aa3eab01c7dc18a205ab5eac8c2b5830d72f1795f3723
-
SHA512
b5d65381ba3e22b3b957ba7addfa60da28effd608295dfc222875464943ca555483ecfbec7588c9917b177926491bd26c1e89ab8bcc0a662f2970f4d332eafd9
Malware Config
Extracted
formbook
4.1
n7ak
modischoolcbse.com
theneverwinter.com
rszkjx-vps-hosting.website
fnihil.com
1pbet.com
nnowzscorrez.com
uaotgvjl.icu
starmapsqatar.com
ekisilani.com
extradeepsheets.com
jam-nins.com
buranly.com
orixentertainment.com
rawtech.energy
myol.guru
utex.club
jiapie.com
wowig.store
wweidlyyl.com
systaskautomation.com
citromudas3a.com
plasticstone.icu
pawchamamapet.com
beautybybby.com
mor-n-mor.com
getoffyourhighhorses.com
chieucaochoban9.xyz
grahamevansmp.com
amplaassessoria.net
nutricookindia.com
wazymbex.icu
joansironing.com
hallforless.com
mycourseprofits.com
precps.com
cookislandstourismpodcast.com
bestonlinedealslive.com
bug.chat
ptjbtoqonjtrwpvkfgmjvwp.com
tortniespodzianka.store
qxkbjgj.icu
aurashape.com
guinealive.com
mondialeresources.com
offthebreak.site
maxamproductivity.com
thebiztip.com
thelocalrea.com
laeducacionadistancia.com
inpakgroup.com
lvgang360.com
allvegangoods.com
tymudanzaramos.com
simpleframeswork.com
thehappycars.com
directfenetres.net
norskatferdsterapi.com
hostingcnx.com
ksmh5x.com
thespiritworldinvitational.com
jetsetwilly3.com
gameflexdev.com
tryhuge.com
vaporvspaper.com
kmresults.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/408-118-0x0000000000000000-mapping.dmp formbook behavioral2/memory/408-120-0x0000000073C00000-0x0000000073C2E000-memory.dmp formbook behavioral2/memory/444-128-0x0000000000E10000-0x0000000000E3E000-memory.dmp formbook -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FACTURA DE PROFORMA PDF.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Frjkovxbye = "C:\\Users\\Admin\\Contacts\\eybxvokjrF.url" FACTURA DE PROFORMA PDF.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
logagent.exechkdsk.exedescription pid process target process PID 408 set thread context of 2472 408 logagent.exe Explorer.EXE PID 444 set thread context of 2472 444 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
logagent.exechkdsk.exepid process 408 logagent.exe 408 logagent.exe 408 logagent.exe 408 logagent.exe 444 chkdsk.exe 444 chkdsk.exe 444 chkdsk.exe 444 chkdsk.exe 444 chkdsk.exe 444 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
logagent.exechkdsk.exepid process 408 logagent.exe 408 logagent.exe 408 logagent.exe 444 chkdsk.exe 444 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
logagent.exechkdsk.exedescription pid process Token: SeDebugPrivilege 408 logagent.exe Token: SeDebugPrivilege 444 chkdsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
FACTURA DE PROFORMA PDF.exeExplorer.EXEchkdsk.exedescription pid process target process PID 3240 wrote to memory of 408 3240 FACTURA DE PROFORMA PDF.exe logagent.exe PID 3240 wrote to memory of 408 3240 FACTURA DE PROFORMA PDF.exe logagent.exe PID 3240 wrote to memory of 408 3240 FACTURA DE PROFORMA PDF.exe logagent.exe PID 3240 wrote to memory of 408 3240 FACTURA DE PROFORMA PDF.exe logagent.exe PID 3240 wrote to memory of 408 3240 FACTURA DE PROFORMA PDF.exe logagent.exe PID 3240 wrote to memory of 408 3240 FACTURA DE PROFORMA PDF.exe logagent.exe PID 2472 wrote to memory of 444 2472 Explorer.EXE chkdsk.exe PID 2472 wrote to memory of 444 2472 Explorer.EXE chkdsk.exe PID 2472 wrote to memory of 444 2472 Explorer.EXE chkdsk.exe PID 444 wrote to memory of 2320 444 chkdsk.exe cmd.exe PID 444 wrote to memory of 2320 444 chkdsk.exe cmd.exe PID 444 wrote to memory of 2320 444 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FACTURA DE PROFORMA PDF.exe"C:\Users\Admin\AppData\Local\Temp\FACTURA DE PROFORMA PDF.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\logagent.exeC:\Windows\System32\logagent.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\logagent.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/408-123-0x0000000000840000-0x00000000008A7000-memory.dmpFilesize
412KB
-
memory/408-118-0x0000000000000000-mapping.dmp
-
memory/408-119-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/408-121-0x0000000004550000-0x0000000004870000-memory.dmpFilesize
3.1MB
-
memory/408-120-0x0000000073C00000-0x0000000073C2E000-memory.dmpFilesize
184KB
-
memory/444-128-0x0000000000E10000-0x0000000000E3E000-memory.dmpFilesize
184KB
-
memory/444-130-0x0000000005430000-0x00000000054C3000-memory.dmpFilesize
588KB
-
memory/444-127-0x0000000001380000-0x000000000138A000-memory.dmpFilesize
40KB
-
memory/444-129-0x00000000056D0000-0x00000000059F0000-memory.dmpFilesize
3.1MB
-
memory/444-125-0x0000000000000000-mapping.dmp
-
memory/2320-126-0x0000000000000000-mapping.dmp
-
memory/2472-124-0x00000000064B0000-0x00000000065B5000-memory.dmpFilesize
1.0MB
-
memory/2472-131-0x0000000002C50000-0x0000000002CF4000-memory.dmpFilesize
656KB
-
memory/3240-116-0x00000000023B1000-0x00000000023C5000-memory.dmpFilesize
80KB
-
memory/3240-115-0x00000000023B0000-0x00000000023B1000-memory.dmpFilesize
4KB
-
memory/3240-117-0x0000000002210000-0x0000000002211000-memory.dmpFilesize
4KB