Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
09-04-2022 16:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220331-en
General
-
Target
tmp.exe
-
Size
1.5MB
-
MD5
a1c4645815d0ab06831f62042cfa0da0
-
SHA1
e3ce2d0fc9bd18ab30d589f052edce9ca410f2ee
-
SHA256
a03ebb1ad2450b07206923043ad865cb83e1d4798a9273704a9626854fd17399
-
SHA512
a34d0c18b833f36e0698e2396270a43ed93d5d2839fa94753ad5fa4e4bf9ec8ecfb3d38f17c0384f30dde1d838c1cf462a40f14da8f430788e5e51cd0162e020
Malware Config
Extracted
formbook
4.1
nff
shinseikai.site
creditmystartup.com
howtovvbucks.com
betterfromthebeginning.com
oubacm.com
stonalogov.com
gentrypartyof8.com
cuesticksandsupplies.com
joelsavestheday.com
llanobnb.com
ecclogic.com
miempaque.com
cai23668.com
miscdr.net
twzhhq.com
bloomandbrewcafe.com
angcomleisure.com
mafeeboutique.com
300coin.club
brooksranchhomes.com
konversiondigital.com
dominivision.com
superiorshinedetailing.net
thehomechef.global
dating-web.site
gcbsclubc.com
mothererph.com
pacleanfuel.com
jerseryshorenflflagfootball.com
roberthyatt.com
wwwmacsports.com
tearor.com
american-ai.com
mkyiyuan.com
gempharmatechllc.com
verdijvtc.com
zimnik-bibo.one
heatherdarkauthor.net
dunn-labs.com
automotivevita.com
bersatubagaidulu.com
gorillarecruiting.com
mikecdmusic.com
femuveewedre.com
onyxmodsllc.com
ooweesports.com
dezeren.com
foeweifgoor73dz.com
sorchaashe.com
jamiitulivu.com
jifengshijie.com
ranchfiberglas.com
glendalesocialmediaagency.com
icuvietnam.com
404hapgood.com
planetturmeric.com
danfrem.com
amazonautomationbusiness.com
switchfinder.com
diversifiedforest.com
findnehomes.com
rsyueda.com
colombianmatrimony.com
evan-dawson.info
yellow-wink.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1156-62-0x000000000041EAF0-mapping.dmp formbook behavioral1/memory/1156-61-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tmp.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1796 set thread context of 1156 1796 tmp.exe tmp.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 472 1156 WerFault.exe tmp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
tmp.exetmp.exedescription pid process target process PID 1796 wrote to memory of 1156 1796 tmp.exe tmp.exe PID 1796 wrote to memory of 1156 1796 tmp.exe tmp.exe PID 1796 wrote to memory of 1156 1796 tmp.exe tmp.exe PID 1796 wrote to memory of 1156 1796 tmp.exe tmp.exe PID 1796 wrote to memory of 1156 1796 tmp.exe tmp.exe PID 1796 wrote to memory of 1156 1796 tmp.exe tmp.exe PID 1796 wrote to memory of 1156 1796 tmp.exe tmp.exe PID 1156 wrote to memory of 472 1156 tmp.exe WerFault.exe PID 1156 wrote to memory of 472 1156 tmp.exe WerFault.exe PID 1156 wrote to memory of 472 1156 tmp.exe WerFault.exe PID 1156 wrote to memory of 472 1156 tmp.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 363⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/472-63-0x0000000000000000-mapping.dmp
-
memory/1156-58-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1156-59-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1156-62-0x000000000041EAF0-mapping.dmp
-
memory/1156-61-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1796-54-0x0000000001010000-0x000000000119A000-memory.dmpFilesize
1.5MB
-
memory/1796-55-0x0000000000250000-0x000000000026E000-memory.dmpFilesize
120KB
-
memory/1796-56-0x0000000005510000-0x00000000055B2000-memory.dmpFilesize
648KB
-
memory/1796-57-0x0000000000660000-0x0000000000694000-memory.dmpFilesize
208KB