Analysis
-
max time kernel
164s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-02-2022 10:59
Static task
static1
General
-
Target
7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe
-
Size
400KB
-
MD5
cb5cd9f8250eaf3861f8774f431032b4
-
SHA1
1de8f273480f80f18d070f1f71aa722923759137
-
SHA256
7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1
-
SHA512
f7b4bc3996fee5fa1606a85f3d3cce6a1dbd6f14a133c81db0061b91528fc36c9856bd684b5d111ad387fff539720391fc2afd52c3b5803a7e192471a21e74cc
Malware Config
Extracted
formbook
4.1
k2i4
apehangersbikersgang.com
lhcgrou.com
diveidf.com
timtas.store
jadebody.club
iamjbrussell.com
fwfuv.icu
picchealth.net
batuair.com
z58609.com
punarecotech.com
a-oct.com
xn--wmq0c1qt9mcxhxjkp16a.top
district99.net
5dcoding.com
aripagripoff.biz
abtheagent.com
betterskincareco.com
jsskylight.com
deviseoffice.com
talentbrothers.com
metacharade.com
cymbpz.icu
saveusclothing.com
alidmpt.com
vyoala.icu
dollarswithdemitri.com
trustbitcoin.city
quadcoptertransportation.com
sx1887.com
ngtr07.com
naturarerum.store
deliciousvegetarianfood.com
378wn.net
lxqjm.com
magicfountain.club
in-novating.com
khokhovula.net
antisecuritysecurityclub.com
vantor.xyz
liumenshan.com
eltfreight.com
garmi-family.com
maridenby.com
theaplusacademy.net
roseintro.online
allthingconsideredbykeki.com
ltlv-ci.com
goel-exports.com
keisanscale.com
fewind.com
tcenjoyers.com
staysugoi.com
natureshealthshop.net
jbsgou.com
polarsc.net
chesapeakebayoyster.com
wyrmzine.com
makeid.online
cityhom.com
accurateamericaroofing.com
peapds.com
punterstoplock.store
startupmentorsquad.com
ruiquanjm.icu
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1152-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exedescription pid Process procid_target PID 544 set thread context of 1152 544 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 99 -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exepid Process 1152 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 1152 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid Process Token: SeShutdownPrivilege 4240 svchost.exe Token: SeCreatePagefilePrivilege 4240 svchost.exe Token: SeShutdownPrivilege 4240 svchost.exe Token: SeCreatePagefilePrivilege 4240 svchost.exe Token: SeShutdownPrivilege 4240 svchost.exe Token: SeCreatePagefilePrivilege 4240 svchost.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe Token: SeRestorePrivilege 5104 TiWorker.exe Token: SeSecurityPrivilege 5104 TiWorker.exe Token: SeBackupPrivilege 5104 TiWorker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exedescription pid Process procid_target PID 544 wrote to memory of 1152 544 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 99 PID 544 wrote to memory of 1152 544 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 99 PID 544 wrote to memory of 1152 544 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 99 PID 544 wrote to memory of 1152 544 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 99 PID 544 wrote to memory of 1152 544 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 99 PID 544 wrote to memory of 1152 544 7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe"C:\Users\Admin\AppData\Local\Temp\7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe"C:\Users\Admin\AppData\Local\Temp\7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5104