Analysis
-
max time kernel
171s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:20
Static task
static1
Behavioral task
behavioral1
Sample
BANK_LET.exe
Resource
win7-20220414-en
General
-
Target
BANK_LET.exe
-
Size
339KB
-
MD5
86bb43248e3ad56e9a839cc6c7b03282
-
SHA1
30afc80c7a9d14fb54cd799b2b2d552c9f2e138d
-
SHA256
286add28a79440668077a7d762ee81ee169f1c08daa27bc680dbf8c8832d2785
-
SHA512
17716ec8e1dbee062a3534eab62e0ba4b793ec94d6f64043493dfddb8424bd0d6a7d792e26d628f86d6acbf18ba671817d30ba243ebbac5a7b4255f8e19a6cc1
Malware Config
Extracted
formbook
3.9
23v
1l4m-5qeh0cgx9a.com
portsel.com
vypnxg.men
renrenbaoshangcheng.com
hulebang.com
heatburnio.com
amazingthunderworks.com
quantumreapers.com
8801i.info
moonlightmanager.com
bqypm.info
backlinkbarato.com
jiudianhuixun.com
markerbio.net
empety.com
eternalkollection.com
teknoshift.com
petitenobel.net
zlmqv.info
emotionalcontrols.com
mitesserentferner.com
kqhqmgxzhklkoo.win
shanghaihuayu.com
gauqc.info
beheartratemonitoringwow.live
sarfarazusmani.com
hamptonandjones.com
mywealth.coach
universidade-online.com
vannuysland.com
studio815.salon
cryptofinance.services
rawholisticnutrition.com
myplusha.com
ritireewaj.com
experimenty-it.info
supremeondemand.com
profeschaneldesign.com
mrdude.tech
devereaux.us
concussionawareness.net
bookboardz.com
beyondcurosity.com
keeperofthebeesnwnj.com
schoolofintrovertship.com
miscowil.date
ysz688.com
eec-lean.com
hennryusa.com
cosmemia.com
faxist.com
odjmusica.com
hgx-bmc.com
mangaromance.com
badnoordzee.com
garden-scope.com
sippingnpaintingcolorado.net
fineveherforb-12.com
storeketo.com
crappie-fishing.com
uwumwx.info
wyalusingbeverage.com
jindiandj.com
minimalistvetonabudget.com
godhep.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/116-149-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/116-151-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/4824-160-0x0000000000460000-0x000000000048A000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BANK_LET.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BANK_LET.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BANK_LET.exe -
Processes:
BANK_LET.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features BANK_LET.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" BANK_LET.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
BANK_LET.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum BANK_LET.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 BANK_LET.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
BANK_LET.exeBANK_LET.exerundll32.exedescription pid process target process PID 4416 set thread context of 116 4416 BANK_LET.exe BANK_LET.exe PID 116 set thread context of 2528 116 BANK_LET.exe Explorer.EXE PID 116 set thread context of 2528 116 BANK_LET.exe Explorer.EXE PID 4824 set thread context of 2528 4824 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
powershell.exeBANK_LET.exerundll32.exepid process 3840 powershell.exe 3840 powershell.exe 116 BANK_LET.exe 116 BANK_LET.exe 116 BANK_LET.exe 116 BANK_LET.exe 116 BANK_LET.exe 116 BANK_LET.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe 4824 rundll32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
BANK_LET.exerundll32.exepid process 116 BANK_LET.exe 116 BANK_LET.exe 116 BANK_LET.exe 116 BANK_LET.exe 4824 rundll32.exe 4824 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeBANK_LET.exerundll32.exedescription pid process Token: SeDebugPrivilege 3840 powershell.exe Token: SeDebugPrivilege 116 BANK_LET.exe Token: SeDebugPrivilege 4824 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
BANK_LET.exeExplorer.EXErundll32.exedescription pid process target process PID 4416 wrote to memory of 3840 4416 BANK_LET.exe powershell.exe PID 4416 wrote to memory of 3840 4416 BANK_LET.exe powershell.exe PID 4416 wrote to memory of 3840 4416 BANK_LET.exe powershell.exe PID 4416 wrote to memory of 116 4416 BANK_LET.exe BANK_LET.exe PID 4416 wrote to memory of 116 4416 BANK_LET.exe BANK_LET.exe PID 4416 wrote to memory of 116 4416 BANK_LET.exe BANK_LET.exe PID 4416 wrote to memory of 116 4416 BANK_LET.exe BANK_LET.exe PID 4416 wrote to memory of 116 4416 BANK_LET.exe BANK_LET.exe PID 4416 wrote to memory of 116 4416 BANK_LET.exe BANK_LET.exe PID 2528 wrote to memory of 4824 2528 Explorer.EXE rundll32.exe PID 2528 wrote to memory of 4824 2528 Explorer.EXE rundll32.exe PID 2528 wrote to memory of 4824 2528 Explorer.EXE rundll32.exe PID 4824 wrote to memory of 536 4824 rundll32.exe cmd.exe PID 4824 wrote to memory of 536 4824 rundll32.exe cmd.exe PID 4824 wrote to memory of 536 4824 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\BANK_LET.exe"C:\Users\Admin\AppData\Local\Temp\BANK_LET.exe"2⤵
- Checks BIOS information in registry
- Windows security modification
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\BANK_LET.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:116 -
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:760
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2312
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1824
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2104
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:612
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BANK_LET.exe"3⤵PID:536