Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
31-01-2022 10:56
Static task
static1
Behavioral task
behavioral1
Sample
PO 0131.exe
Resource
win7-en-20211208
General
-
Target
PO 0131.exe
-
Size
601KB
-
MD5
eb437cbf64c34aebc51d6fd32ceec985
-
SHA1
2a1d8901240f6079da9c6978aabb658d55114d12
-
SHA256
3d4e25f876b2007b8b03a1d79109a52fcb5602644fb4554eb065f97853daa5de
-
SHA512
af5a6a5c4479ac2a5dc6988d8a283ff022914347159440bb8f292fa426253cb6eefe67809701eb4996de4f92a85e933003796669523cd99500f5337e547d9d38
Malware Config
Extracted
formbook
4.1
je16
antonavt.com
sdfvlog.xyz
xn--arbetslivsaktren-ywb.com
propelcolor.com
uniqueclsssiccars.com
colorbells.com
synjive.com
cloudymellows.com
walltage.com
qterps.com
kezorup.online
soakedindelight.online
thefirstgroupscam.biz
miclanka.com
mwm-security.com
trinksaifenradiodocumentary.com
spineklinik.com
javacodecafe.com
groovyrelease-toknowtoday.info
ventadesillasymesas.com
metaheaven.global
supershhhbros.com
tradecardsbtz.com
parcel-alert-redelivery.com
manoncollinet.com
yfsallegiance.com
my12127.com
connectedmk.com
m7ssucx.xyz
chefjeffrecipes.com
tgogziae.com
xu7d7mfh6fht.xyz
cdamanagementservices.com
tampanazareno.com
albanybestbuyers.com
cowboychannellpus.com
dreamyhousewife.com
wu8jvohkp12w.xyz
mohaisen.xyz
s-h-a-h.com
hainanmizhi.xyz
hypedrize.com
77hub.cloud
phxpowdercoating.com
vozeestore.com
infostate.store
woshinidie1990.com
riskfreeenergy.com
southernfreelancersph.com
smithstores.net
cryptopal.xyz
xk8abxci6ogf.xyz
explainersadvids.team
ponpesihsaniyah.com
szabossteakandseafood.com
willtuckfinancial.com
unitedwii.com
thenftlotterys.com
599qu.com
threegalasdesigns.com
bedplot.xyz
liquidministry.store
amazingfactsabouteverything.com
wofdex.com
wakilin.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/776-135-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2816-141-0x0000000002AA0000-0x0000000002ACF000-memory.dmp formbook -
Sets service image path in registry 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO 0131.exePO 0131.exeipconfig.exedescription pid process target process PID 3412 set thread context of 776 3412 PO 0131.exe PO 0131.exe PID 776 set thread context of 2424 776 PO 0131.exe Explorer.EXE PID 2816 set thread context of 2424 2816 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2816 ipconfig.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
PO 0131.exeipconfig.exepid process 776 PO 0131.exe 776 PO 0131.exe 776 PO 0131.exe 776 PO 0131.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe 2816 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2424 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PO 0131.exeipconfig.exepid process 776 PO 0131.exe 776 PO 0131.exe 776 PO 0131.exe 2816 ipconfig.exe 2816 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
PO 0131.exeipconfig.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 776 PO 0131.exe Token: SeDebugPrivilege 2816 ipconfig.exe Token: SeShutdownPrivilege 2424 Explorer.EXE Token: SeCreatePagefilePrivilege 2424 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PO 0131.exeExplorer.EXEipconfig.exedescription pid process target process PID 3412 wrote to memory of 776 3412 PO 0131.exe PO 0131.exe PID 3412 wrote to memory of 776 3412 PO 0131.exe PO 0131.exe PID 3412 wrote to memory of 776 3412 PO 0131.exe PO 0131.exe PID 3412 wrote to memory of 776 3412 PO 0131.exe PO 0131.exe PID 3412 wrote to memory of 776 3412 PO 0131.exe PO 0131.exe PID 3412 wrote to memory of 776 3412 PO 0131.exe PO 0131.exe PID 2424 wrote to memory of 2816 2424 Explorer.EXE ipconfig.exe PID 2424 wrote to memory of 2816 2424 Explorer.EXE ipconfig.exe PID 2424 wrote to memory of 2816 2424 Explorer.EXE ipconfig.exe PID 2816 wrote to memory of 3784 2816 ipconfig.exe cmd.exe PID 2816 wrote to memory of 3784 2816 ipconfig.exe cmd.exe PID 2816 wrote to memory of 3784 2816 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO 0131.exe"C:\Users\Admin\AppData\Local\Temp\PO 0131.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO 0131.exe"C:\Users\Admin\AppData\Local\Temp\PO 0131.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO 0131.exe"3⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 6bf4c037a60f74c25680af0f18ccb626 C25sboTFCk+5gsrP8JQ7OQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/776-135-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/776-138-0x0000000000F90000-0x0000000000FA4000-memory.dmpFilesize
80KB
-
memory/776-137-0x0000000001040000-0x00000000017EA000-memory.dmpFilesize
7.7MB
-
memory/2424-144-0x0000000008A60000-0x0000000008BE2000-memory.dmpFilesize
1.5MB
-
memory/2424-139-0x0000000002D10000-0x0000000002E0F000-memory.dmpFilesize
1020KB
-
memory/2816-141-0x0000000002AA0000-0x0000000002ACF000-memory.dmpFilesize
188KB
-
memory/2816-140-0x00000000006E0000-0x00000000006EB000-memory.dmpFilesize
44KB
-
memory/2816-142-0x0000000003170000-0x00000000034BA000-memory.dmpFilesize
3.3MB
-
memory/2816-143-0x0000000003080000-0x0000000003113000-memory.dmpFilesize
588KB
-
memory/3412-134-0x0000000005AB0000-0x0000000006054000-memory.dmpFilesize
5.6MB
-
memory/3412-133-0x00000000050F0000-0x000000000518C000-memory.dmpFilesize
624KB
-
memory/3412-132-0x0000000004E50000-0x0000000004EE2000-memory.dmpFilesize
584KB
-
memory/3412-130-0x00000000001D0000-0x000000000026C000-memory.dmpFilesize
624KB
-
memory/3412-131-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB