Analysis
-
max time kernel
130s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
31-01-2022 08:04
Static task
static1
General
-
Target
b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe
-
Size
510KB
-
MD5
9e50ed09439b4f2206f6cee1b233677c
-
SHA1
719705903de481a3c680db18f8cef892efef3dc7
-
SHA256
b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9
-
SHA512
927789d6fca24317b1cc41825485cf06cf337204d8007b32220ef2fb28ee48275102a9148682336f76e7586e5ed714d1de2098c08886ea1b76007880a5c45d80
Malware Config
Extracted
formbook
4.1
bt33
mbaonlinefreedegress.info
myforevermaid.com
daoyi365.com
weientm.com
legal-mx.com
formationrigging.com
heidiet.xyz
school-prosto.store
healthvitaminnutrition.com
digitalsolutionusa.com
little-bazar.com
jnbeautycanada.com
optoelek.com
learntoairmail.com
hawkminer.com
kingofearth.love
ktnstay.xyz
zouxin.love
mainlandpr.com
mamm-hummel.com
planosdwgcad.com
dlscordapp.info
northfacecore.online
professionalswhotrade.com
vbcgrp.com
spares245.com
alphasignsatl.online
342731.com
amazingarizonaproperty.com
priorlakecarpetcleaning.com
boardwalksnj.com
shiinebydesign.com
dymends.digital
indie-shopper.com
weihiw.quest
dchehe.com
momshousegeorgia.com
bnvxnohpcuhxbcueuvl.biz
tinyspout.com
hambransupply.com
keywordjord.com
koebnertriangle.com
aodiskoo.com
zgqyjlhw.com
thule-usa.store
western-overseas.online
woofpack-adventures.com
tilallarehome.com
51easyprint.com
arucad.university
llanoseeds.com
3-v0.space
harsors.com
sumiyoshiku-tenisuhiji.xyz
alsafqah.com
wrxworld.net
evrefill.com
multicoopltda.com
ziggytherealtor.com
candidatbellomansour.info
bigpromo.club
evagrombook.com
lyni7lyo.xyz
ways.express
karasevda-jor.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3240-135-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Sets service image path in registry 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exedescription pid process target process PID 1868 set thread context of 3240 1868 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exepid process 3240 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe 3240 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exedescription pid process target process PID 1868 wrote to memory of 3240 1868 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe PID 1868 wrote to memory of 3240 1868 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe PID 1868 wrote to memory of 3240 1868 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe PID 1868 wrote to memory of 3240 1868 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe PID 1868 wrote to memory of 3240 1868 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe PID 1868 wrote to memory of 3240 1868 b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe"C:\Users\Admin\AppData\Local\Temp\b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe"C:\Users\Admin\AppData\Local\Temp\b45a38f7012d02b12d3613d25450847d87c14c9b3207380594fc5e1f1b1728d9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 28d0bc1d5816cbad20acf6bdf648b01d rEcNAZsAOEW++cZOK4xq1g.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1868-130-0x00000000001C0000-0x0000000000246000-memory.dmpFilesize
536KB
-
memory/1868-131-0x0000000004D80000-0x0000000004D81000-memory.dmpFilesize
4KB
-
memory/1868-132-0x0000000004E30000-0x0000000004EC2000-memory.dmpFilesize
584KB
-
memory/1868-133-0x00000000009A0000-0x0000000000A3C000-memory.dmpFilesize
624KB
-
memory/1868-134-0x0000000005830000-0x0000000005DD4000-memory.dmpFilesize
5.6MB
-
memory/3240-135-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3240-136-0x0000000000FC0000-0x000000000176A000-memory.dmpFilesize
7.7MB