Analysis
-
max time kernel
162s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 10:50
Static task
static1
Behavioral task
behavioral1
Sample
009888389998789290000-pdf.exe
Resource
win7-20220414-en
General
-
Target
009888389998789290000-pdf.exe
-
Size
876KB
-
MD5
c4dc14e8754c36300ae98fa8b4369a40
-
SHA1
9cd8e279dff02db6ffb9199cf6cb4ff5fc07cc37
-
SHA256
c303fb93eba5623184f5bfb8fefbea2458e25ead795e6d5c5d5e78e921c6490e
-
SHA512
ba4280059eb153941d0c06533542a10d25f5c95c45bbebce620f042560df2557e1eae6ea3a405d6663c9552eb8dc49bb1cfccb2659e834a06fac4587373c7382
Malware Config
Extracted
formbook
3.9
hm2
vodu.ltd
arauderghem.net
bluebackpage.com
cheapairmaxsaleclearance.com
soldiersofarts.com
fbservice.info
x9e7x7.info
davidhenkel.com
plantrak.net
66sbleiv.com
cartierringprice.com
roupeiroblog.com
thxcn.com
baboondynasty.win
thecloudm.com
everythingreviews.net
zimmermansales.net
movie.kitchen
im.help
geebzor.com
quanbaodao.com
kasalogistics.com
comomanteracasaarrumada.biz
hhmeitu.com
goodlookbook.net
genuineworldkw.com
safetraffic4upgrades.date
bbgan21.com
goldamerican.info
gotoinfo.company
courtneyraestyles.com
kushyp.com
trendzspot.com
klmdzch.com
noridabio.com
gemilangnusantara.com
evethaber.com
activehealth.online
24cassinhill.com
uniquecustomkreationz.com
arte-enlevo.com
kaphanfoundation.net
luciagiacomin.com
4444677.com
ink4speed.com
advisemi.com
wildlife-botanicals.com
islandviewantigua.com
millerwolfdental.com
testci20190225031512.com
lucyble.com
elitlazer.com
applyforpermit.com
jinshavip74.com
xdxty.com
thedragon.tech
independentdvm.com
afm-alliance.com
freelanceti.com
enemacookbook.com
starvingartistconference.com
xn--zovsa0670a.com
zuhao91.com
toprenovation101.com
nyoxibwer.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4448-138-0x0000000000B30000-0x0000000000B5A000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
009888389998789290000-pdf.exe009888389998789290000-pdf.exemstsc.exedescription pid process target process PID 5088 set thread context of 852 5088 009888389998789290000-pdf.exe 009888389998789290000-pdf.exe PID 852 set thread context of 796 852 009888389998789290000-pdf.exe Explorer.EXE PID 4448 set thread context of 796 4448 mstsc.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
009888389998789290000-pdf.exe009888389998789290000-pdf.exemstsc.exepid process 5088 009888389998789290000-pdf.exe 5088 009888389998789290000-pdf.exe 852 009888389998789290000-pdf.exe 852 009888389998789290000-pdf.exe 852 009888389998789290000-pdf.exe 852 009888389998789290000-pdf.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe 4448 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 796 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
009888389998789290000-pdf.exe009888389998789290000-pdf.exemstsc.exepid process 5088 009888389998789290000-pdf.exe 852 009888389998789290000-pdf.exe 852 009888389998789290000-pdf.exe 852 009888389998789290000-pdf.exe 4448 mstsc.exe 4448 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
009888389998789290000-pdf.exemstsc.exedescription pid process Token: SeDebugPrivilege 852 009888389998789290000-pdf.exe Token: SeDebugPrivilege 4448 mstsc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
009888389998789290000-pdf.exeExplorer.EXEmstsc.exedescription pid process target process PID 5088 wrote to memory of 852 5088 009888389998789290000-pdf.exe 009888389998789290000-pdf.exe PID 5088 wrote to memory of 852 5088 009888389998789290000-pdf.exe 009888389998789290000-pdf.exe PID 5088 wrote to memory of 852 5088 009888389998789290000-pdf.exe 009888389998789290000-pdf.exe PID 796 wrote to memory of 4448 796 Explorer.EXE mstsc.exe PID 796 wrote to memory of 4448 796 Explorer.EXE mstsc.exe PID 796 wrote to memory of 4448 796 Explorer.EXE mstsc.exe PID 4448 wrote to memory of 4192 4448 mstsc.exe cmd.exe PID 4448 wrote to memory of 4192 4448 mstsc.exe cmd.exe PID 4448 wrote to memory of 4192 4448 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"3⤵PID:4192
-
-