Analysis
-
max time kernel
181s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:19
Static task
static1
Behavioral task
behavioral1
Sample
Salary.exe
Resource
win7-20220414-en
General
-
Target
Salary.exe
-
Size
352KB
-
MD5
6d5f3175c300da6ea8a6875a4682edd9
-
SHA1
ebf2ab3c7fa3cd6f3dcb16e8d1f8faedb16bd7e6
-
SHA256
4f5081f499127a975be464ff8bb659d88a455cf17da0579c20732097507b6226
-
SHA512
5dcddce714ce32048466d51d59fcfa84e2949ae01f3b8f0add3f871e03b80f964649963f51ea62bff190bb16fdb0e31bf3802f3fa33d4fc5b1c604da9399720d
Malware Config
Extracted
formbook
4.0
g8u
stuition.com
mj-sculpture.com
cannatainmentevents.com
dianjintang.com
rmlusitania.info
effet-spiruline.com
flatheme.com
supergaminator-vip.com
craftyourmagic.com
lakai.ltd
electionshawaii.com
iqpdct.com
thebestfourstarhotels.com
satoshiceo.com
saintmartiner.com
brothersmarinetoronto.com
citicoin.online
scentsationalsniffers.com
hellonighbourgameees.com
displayonline-france.com
cait-compare.com
aprenderoratoria.com
stehtisch24.com
cocktailandcocktalk.com
hybridtablesaw.com
ynnkfs.com
capitolman.com
xccomm.com
dannyhustle.com
9jiuhao.com
ossigenopoliatomicoliquido.biz
casayards.com
hotelmesonreal.com
lffcfftl.com
raiserobo.com
ssav33.com
oceanicmarinerisks.com
star-fairtrading.com
universecoolest.com
www8557v.com
reparaciones-ordenadores.com
residenteyecarepa.com
x-hom.com
finestsalon.com
xn--n8jydrczh8g7f7a7lp527d.com
dallasfortworthseopro.com
talentsplanner.com
gdmen.com
life-insurer-zone.live
tunnelrobot.com
vietnamexport.net
inlishui.site
inaneufeld.com
sleepingsling.com
huaian.ltd
iluxol.com
mahavirjwellersnoida.com
fastaskme.men
rsinsur.com
datingevo.com
bringmesomething.online
banjiasanti.com
zhixinchain.net
medifloors.com
tromagy.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1176-60-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/1176-61-0x000000000041E370-mapping.dmp formbook behavioral1/memory/1724-69-0x00000000000E0000-0x000000000010D000-memory.dmp formbook -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1120-56-0x00000000008C0000-0x00000000008FA000-memory.dmp rezer0 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
mstsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mstsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\JX8XKZIXF4P = "C:\\Program Files (x86)\\Iobil\\userazz.exe" mstsc.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 904 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Salary.exeSalary.exemstsc.exedescription pid process target process PID 1120 set thread context of 1176 1120 Salary.exe Salary.exe PID 1176 set thread context of 1292 1176 Salary.exe Explorer.EXE PID 1724 set thread context of 1292 1724 mstsc.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
mstsc.exedescription ioc process File opened for modification C:\Program Files (x86)\Iobil\userazz.exe mstsc.exe -
Processes:
mstsc.exedescription ioc process Key created \Registry\User\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
Salary.exemstsc.exepid process 1176 Salary.exe 1176 Salary.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe 1724 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Salary.exemstsc.exepid process 1176 Salary.exe 1176 Salary.exe 1176 Salary.exe 1724 mstsc.exe 1724 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Salary.exemstsc.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1176 Salary.exe Token: SeDebugPrivilege 1724 mstsc.exe Token: SeShutdownPrivilege 1292 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Salary.exeExplorer.EXEmstsc.exedescription pid process target process PID 1120 wrote to memory of 1176 1120 Salary.exe Salary.exe PID 1120 wrote to memory of 1176 1120 Salary.exe Salary.exe PID 1120 wrote to memory of 1176 1120 Salary.exe Salary.exe PID 1120 wrote to memory of 1176 1120 Salary.exe Salary.exe PID 1120 wrote to memory of 1176 1120 Salary.exe Salary.exe PID 1120 wrote to memory of 1176 1120 Salary.exe Salary.exe PID 1120 wrote to memory of 1176 1120 Salary.exe Salary.exe PID 1292 wrote to memory of 1724 1292 Explorer.EXE mstsc.exe PID 1292 wrote to memory of 1724 1292 Explorer.EXE mstsc.exe PID 1292 wrote to memory of 1724 1292 Explorer.EXE mstsc.exe PID 1292 wrote to memory of 1724 1292 Explorer.EXE mstsc.exe PID 1724 wrote to memory of 904 1724 mstsc.exe cmd.exe PID 1724 wrote to memory of 904 1724 mstsc.exe cmd.exe PID 1724 wrote to memory of 904 1724 mstsc.exe cmd.exe PID 1724 wrote to memory of 904 1724 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Salary.exe"C:\Users\Admin\AppData\Local\Temp\Salary.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Salary.exe"C:\Users\Admin\AppData\Local\Temp\Salary.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Salary.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\3M7QRD2U\3M7logim.jpegFilesize
60KB
MD5700556da1b3f3501e3d0158564e2f1f9
SHA1ffe102a41b1dd3f33aa45747f6131a390d20549a
SHA2566668d470e9a89637b6d7196b0e0298522ac5878db57509c10eed1c15e3bc22c7
SHA5127446eba784460cb198e5fa4ba697fc987f8839213d42e02ee328029e2f232e1aba82d852384a19df8567d5f113b067308f8a16da1e6bef649c850c4f43122f1b
-
C:\Users\Admin\AppData\Roaming\3M7QRD2U\3M7logri.iniFilesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
C:\Users\Admin\AppData\Roaming\3M7QRD2U\3M7logrv.iniFilesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf
-
memory/904-71-0x0000000000000000-mapping.dmp
-
memory/1120-55-0x00000000003D0000-0x00000000003DA000-memory.dmpFilesize
40KB
-
memory/1120-56-0x00000000008C0000-0x00000000008FA000-memory.dmpFilesize
232KB
-
memory/1120-54-0x0000000001320000-0x000000000137E000-memory.dmpFilesize
376KB
-
memory/1176-60-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1176-63-0x0000000000970000-0x0000000000C73000-memory.dmpFilesize
3.0MB
-
memory/1176-57-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1176-64-0x00000000003D0000-0x00000000003E4000-memory.dmpFilesize
80KB
-
memory/1176-58-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1176-61-0x000000000041E370-mapping.dmp
-
memory/1292-65-0x00000000061B0000-0x00000000062E1000-memory.dmpFilesize
1.2MB
-
memory/1292-73-0x00000000041E0000-0x0000000004277000-memory.dmpFilesize
604KB
-
memory/1724-67-0x0000000076721000-0x0000000076723000-memory.dmpFilesize
8KB
-
memory/1724-72-0x0000000000A00000-0x0000000000A93000-memory.dmpFilesize
588KB
-
memory/1724-70-0x0000000002160000-0x0000000002463000-memory.dmpFilesize
3.0MB
-
memory/1724-69-0x00000000000E0000-0x000000000010D000-memory.dmpFilesize
180KB
-
memory/1724-68-0x0000000000C50000-0x0000000000D54000-memory.dmpFilesize
1.0MB
-
memory/1724-66-0x0000000000000000-mapping.dmp