Analysis
-
max time kernel
152s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:29
Static task
static1
Behavioral task
behavioral1
Sample
New PI PL.exe
Resource
win7-20220414-en
General
-
Target
New PI PL.exe
-
Size
945KB
-
MD5
332e036148c15d2453735b513bb8d693
-
SHA1
ffe088da337a5d87baeb1f3de49f83ff6a607c0a
-
SHA256
d4cca60154fcc667ada19dffbac16f84b51691a540daf850a766b91bd46544fe
-
SHA512
099a9ad6dd681e580e7ab0ab1798a51ccb9ce92a9ed001e7a8e49f0c57a714932cbc20c06670683fdb67be1ab88ba4b54e4f67568884deed1bc8921ecee4aed9
Malware Config
Extracted
formbook
4.1
wus
generativecoaching.net
skillmosaic.com
practicalmaster.com
12aminmiami.com
instagramsupport.online
mainelse.net
qqysmr.com
wealthxd.com
videoadscreator.com
dltzscl.com
cotaforjulyans.com
forcend.com
shinjukufilm.com
bsq30.com
dragonsrose.net
loganbuys.com
wwwfitnessymusica.com
microbladingdublin.com
corporateiconic.com
sunshinegroupnyc.com
cpc000.com
aerialliftland.com
50j6tfl4t7.biz
phransus.com
sepez.com
alephmim.com
mobster.tech
armanismiami.com
maviswancyzk.com
prephurricane.com
danielryanwrites.com
niruli96.party
westgastro-lbc.com
gofoodieweb.com
daveselectricalco.com
treasuresofwallstreet.com
ebaychinadirect.com
michaelmaffait.com
konnect-4.com
weiguanwo.com
joycestravels.com
allstatehurricaneirmaclaims.com
necoservicios.com
kuishei.com
twentydc.scot
semohomesource.com
graymensociety.com
jswmpc.com
tlpropertybuyers.com
azteccar.com
thesourcespirit.com
fhtps.com
sabrinacameron.com
130aa4.com
junowagashi.com
seocherubin.com
fashionnpva.com
photoidrental.com
sierraassets.net
zhubao258.com
athenscraftbeerexpo.com
zzizzle.net
greengoenvironmental.com
goveducc.com
howcuty.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1180-62-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/1180-63-0x000000000041E290-mapping.dmp formbook behavioral1/memory/1180-65-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2044-72-0x0000000000080000-0x00000000000AD000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
New PI PL.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion New PI PL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion New PI PL.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 280 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MJOXV418GJ = "C:\\Program Files (x86)\\Ktbcdzlnh\\msnng4x.exe" svchost.exe Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
New PI PL.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum New PI PL.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 New PI PL.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
New PI PL.exeNew PI PL.exesvchost.exedescription pid process target process PID 1120 set thread context of 1180 1120 New PI PL.exe New PI PL.exe PID 1180 set thread context of 1396 1180 New PI PL.exe Explorer.EXE PID 2044 set thread context of 1396 2044 svchost.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Ktbcdzlnh\msnng4x.exe svchost.exe -
Processes:
svchost.exedescription ioc process Key created \Registry\User\S-1-5-21-790309383-526510583-3802439154-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
New PI PL.exesvchost.exepid process 1180 New PI PL.exe 1180 New PI PL.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
New PI PL.exesvchost.exepid process 1180 New PI PL.exe 1180 New PI PL.exe 1180 New PI PL.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
New PI PL.exesvchost.exedescription pid process Token: SeDebugPrivilege 1180 New PI PL.exe Token: SeDebugPrivilege 2044 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
New PI PL.exeExplorer.EXEsvchost.exedescription pid process target process PID 1120 wrote to memory of 1180 1120 New PI PL.exe New PI PL.exe PID 1120 wrote to memory of 1180 1120 New PI PL.exe New PI PL.exe PID 1120 wrote to memory of 1180 1120 New PI PL.exe New PI PL.exe PID 1120 wrote to memory of 1180 1120 New PI PL.exe New PI PL.exe PID 1120 wrote to memory of 1180 1120 New PI PL.exe New PI PL.exe PID 1120 wrote to memory of 1180 1120 New PI PL.exe New PI PL.exe PID 1120 wrote to memory of 1180 1120 New PI PL.exe New PI PL.exe PID 1396 wrote to memory of 2044 1396 Explorer.EXE svchost.exe PID 1396 wrote to memory of 2044 1396 Explorer.EXE svchost.exe PID 1396 wrote to memory of 2044 1396 Explorer.EXE svchost.exe PID 1396 wrote to memory of 2044 1396 Explorer.EXE svchost.exe PID 2044 wrote to memory of 280 2044 svchost.exe cmd.exe PID 2044 wrote to memory of 280 2044 svchost.exe cmd.exe PID 2044 wrote to memory of 280 2044 svchost.exe cmd.exe PID 2044 wrote to memory of 280 2044 svchost.exe cmd.exe PID 2044 wrote to memory of 1968 2044 svchost.exe Firefox.exe PID 2044 wrote to memory of 1968 2044 svchost.exe Firefox.exe PID 2044 wrote to memory of 1968 2044 svchost.exe Firefox.exe PID 2044 wrote to memory of 1968 2044 svchost.exe Firefox.exe PID 2044 wrote to memory of 1968 2044 svchost.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"3⤵
- Deletes itself
PID:280 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1968