Analysis
-
max time kernel
172s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:24
Static task
static1
Behavioral task
behavioral1
Sample
Salary.exe
Resource
win7-20220414-en
General
-
Target
Salary.exe
-
Size
354KB
-
MD5
3abc3bd58ec7ecd38e1f25823a3a1833
-
SHA1
887ac2315f548e3699d0ad340b4b677a679ec434
-
SHA256
9c5d88a1518cd310e763757d9acd267ed5741d6c79036e1053381729a0d700ca
-
SHA512
393e69f3741a477a77aefb9e2082829e05a2b68f173e29f2cae909661739f307754161b16b1a8820cd5d614e51adddf95f111696edd33c066c7fc77ad931b067
Malware Config
Extracted
formbook
4.0
g8u
stuition.com
mj-sculpture.com
cannatainmentevents.com
dianjintang.com
rmlusitania.info
effet-spiruline.com
flatheme.com
supergaminator-vip.com
craftyourmagic.com
lakai.ltd
electionshawaii.com
iqpdct.com
thebestfourstarhotels.com
satoshiceo.com
saintmartiner.com
brothersmarinetoronto.com
citicoin.online
scentsationalsniffers.com
hellonighbourgameees.com
displayonline-france.com
cait-compare.com
aprenderoratoria.com
stehtisch24.com
cocktailandcocktalk.com
hybridtablesaw.com
ynnkfs.com
capitolman.com
xccomm.com
dannyhustle.com
9jiuhao.com
ossigenopoliatomicoliquido.biz
casayards.com
hotelmesonreal.com
lffcfftl.com
raiserobo.com
ssav33.com
oceanicmarinerisks.com
star-fairtrading.com
universecoolest.com
www8557v.com
reparaciones-ordenadores.com
residenteyecarepa.com
x-hom.com
finestsalon.com
xn--n8jydrczh8g7f7a7lp527d.com
dallasfortworthseopro.com
talentsplanner.com
gdmen.com
life-insurer-zone.live
tunnelrobot.com
vietnamexport.net
inlishui.site
inaneufeld.com
sleepingsling.com
huaian.ltd
iluxol.com
mahavirjwellersnoida.com
fastaskme.men
rsinsur.com
datingevo.com
bringmesomething.online
banjiasanti.com
zhixinchain.net
medifloors.com
tromagy.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1356-60-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/1356-61-0x000000000041E370-mapping.dmp formbook behavioral1/memory/1356-63-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/932-69-0x00000000000D0000-0x00000000000FD000-memory.dmp formbook -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/988-56-0x0000000004510000-0x000000000454A000-memory.dmp rezer0 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
help.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run help.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\YRZX9FWHIX = "C:\\Program Files (x86)\\L-z4lwvzh\\helprff4l.exe" help.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 764 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Salary.exeSalary.exehelp.exedescription pid process target process PID 988 set thread context of 1356 988 Salary.exe Salary.exe PID 1356 set thread context of 1232 1356 Salary.exe Explorer.EXE PID 932 set thread context of 1232 932 help.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
help.exedescription ioc process File opened for modification C:\Program Files (x86)\L-z4lwvzh\helprff4l.exe help.exe -
Processes:
help.exedescription ioc process Key created \Registry\User\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Salary.exehelp.exepid process 1356 Salary.exe 1356 Salary.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe 932 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Salary.exehelp.exepid process 1356 Salary.exe 1356 Salary.exe 1356 Salary.exe 932 help.exe 932 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Salary.exehelp.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1356 Salary.exe Token: SeDebugPrivilege 932 help.exe Token: SeShutdownPrivilege 1232 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Salary.exeExplorer.EXEhelp.exedescription pid process target process PID 988 wrote to memory of 1356 988 Salary.exe Salary.exe PID 988 wrote to memory of 1356 988 Salary.exe Salary.exe PID 988 wrote to memory of 1356 988 Salary.exe Salary.exe PID 988 wrote to memory of 1356 988 Salary.exe Salary.exe PID 988 wrote to memory of 1356 988 Salary.exe Salary.exe PID 988 wrote to memory of 1356 988 Salary.exe Salary.exe PID 988 wrote to memory of 1356 988 Salary.exe Salary.exe PID 1232 wrote to memory of 932 1232 Explorer.EXE help.exe PID 1232 wrote to memory of 932 1232 Explorer.EXE help.exe PID 1232 wrote to memory of 932 1232 Explorer.EXE help.exe PID 1232 wrote to memory of 932 1232 Explorer.EXE help.exe PID 932 wrote to memory of 764 932 help.exe cmd.exe PID 932 wrote to memory of 764 932 help.exe cmd.exe PID 932 wrote to memory of 764 932 help.exe cmd.exe PID 932 wrote to memory of 764 932 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Salary.exe"C:\Users\Admin\AppData\Local\Temp\Salary.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Salary.exe"C:\Users\Admin\AppData\Local\Temp\Salary.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Salary.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\3M7QRD2U\3M7logim.jpegFilesize
62KB
MD535be22f04a083f244ecf878e7778ad32
SHA1207cd2030880aeb8ea79e3a120779ba85452b239
SHA2560b6c7a024831d9645272efad7aeca9596059eb21346e23d4459c10b01b0edfa1
SHA512ddae6de657f43ee6d3b00af0044102401cf7671bed4b1d7d9f6dae2886e496ad6f673a7eee91eeb7ddf32de0f69ad6559ea82d0cdf2272c7d7d97cfc7a9274a6
-
C:\Users\Admin\AppData\Roaming\3M7QRD2U\3M7logri.iniFilesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
C:\Users\Admin\AppData\Roaming\3M7QRD2U\3M7logrv.iniFilesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf
-
memory/764-71-0x0000000000000000-mapping.dmp
-
memory/932-74-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/932-69-0x00000000000D0000-0x00000000000FD000-memory.dmpFilesize
180KB
-
memory/932-72-0x0000000000470000-0x0000000000503000-memory.dmpFilesize
588KB
-
memory/932-70-0x00000000007D0000-0x0000000000AD3000-memory.dmpFilesize
3.0MB
-
memory/932-67-0x0000000000000000-mapping.dmp
-
memory/932-68-0x0000000000C30000-0x0000000000C36000-memory.dmpFilesize
24KB
-
memory/988-56-0x0000000004510000-0x000000000454A000-memory.dmpFilesize
232KB
-
memory/988-55-0x0000000000350000-0x000000000035A000-memory.dmpFilesize
40KB
-
memory/988-54-0x0000000000200000-0x000000000025E000-memory.dmpFilesize
376KB
-
memory/1232-66-0x0000000005FD0000-0x000000000613A000-memory.dmpFilesize
1.4MB
-
memory/1232-73-0x00000000064F0000-0x0000000006681000-memory.dmpFilesize
1.6MB
-
memory/1356-65-0x0000000000260000-0x0000000000274000-memory.dmpFilesize
80KB
-
memory/1356-64-0x0000000000810000-0x0000000000B13000-memory.dmpFilesize
3.0MB
-
memory/1356-63-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1356-61-0x000000000041E370-mapping.dmp
-
memory/1356-60-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1356-58-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1356-57-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB