Overview
overview
10Static
static
Company Pr...df.exe
windows7_x64
10Company Pr...df.exe
windows10-2004_x64
10Invoices12...df.exe
windows7_x64
10Invoices12...df.exe
windows10-2004_x64
10Me jpg jpg...pg.exe
windows7_x64
10Me jpg jpg...pg.exe
windows10-2004_x64
10Pictures&D...pg.exe
windows7_x64
10Pictures&D...pg.exe
windows10-2004_x64
10Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:51
Static task
static1
Behavioral task
behavioral1
Sample
Company Profile pdf pdf pdf pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Company Profile pdf pdf pdf pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Invoices12032018 pdf pdf pdf pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Invoices12032018 pdf pdf pdf pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Me jpg jpg jpg jpg jpg.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Me jpg jpg jpg jpg jpg.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
Pictures&Designs jpg jpg jpg jpg.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
Pictures&Designs jpg jpg jpg jpg.exe
Resource
win10v2004-20220414-en
General
-
Target
Me jpg jpg jpg jpg jpg.exe
-
Size
794KB
-
MD5
2ede82a76d48e1a1cf3d3c55b18db290
-
SHA1
854589e5ea918e9033e56216a7f3d6bfd6dec59a
-
SHA256
f1c80232eaed26af259c818427b444f12057b9329804da8ded13ec9fd20d3413
-
SHA512
1e0deaf9afeed65367f7b0d04cc413449331820b03bd075dbadc1a593842ce3dc7f868ccee5aa7af32cc528d01558f5251313f938d1bc5a431f71ca0fe1f409a
Malware Config
Extracted
formbook
4.1
hha
atarairdive.com
binanca.com
krepostta-sofia.com
chiangmaipartys.com
bestglobalseo.com
rdsri.com
immaginaeventi.com
lushrox.com
kenderia.com
goldenbrownacademy.com
kiddyquest.com
cs-support.online
magicovino.com
banderasacuadros.com
originalducatispareparts.com
tfpfleet.com
wickedmaple.com
fasypeoplesearch.com
zggwpmwdcp.com
boav11.com
development88.com
naturestourssrilanka.com
fertycc.info
messenger-marketing.biz
gloucesterchauffeurs.com
gdhawell.com
paymejo.com
preparedtrafficupdates.win
youpinpuzi.com
gweneldor.tech
110408.info
19mosaics.com
radyoajanda.net
photographyhere-now.com
clickoncr.com
safeenamedia.com
jh3.tech
darinsfault.net
jbrwcfn.com
trandway.com
copecafe.net
mansourmall.com
chiyodaku-fudosan.com
idealgrphics.com
coldwardecor.com
airfan-video.com
mfash.info
zebrometer.com
hummingbirdindustries.info
buylasvegasluxury.com
blondsthlm.com
guggenheimre.com
savethewoodie.info
museumscreens.com
goodplacelotto.com
snackans.com
estimergia.com
laacia.life
swtsthotel.com
btcass.com
thewatchknight.com
bangladesherkhobor.net
sulphurinsatisfaction.com
casa-rural-cadiz.com
yofdyk.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral6/memory/5024-137-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral6/memory/5024-142-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral6/memory/4212-148-0x00000000006C0000-0x00000000006ED000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Me jpg jpg jpg jpg jpg.exeMe jpg jpg jpg jpg jpg.exeNETSTAT.EXEdescription pid process target process PID 872 set thread context of 5024 872 Me jpg jpg jpg jpg jpg.exe Me jpg jpg jpg jpg jpg.exe PID 5024 set thread context of 3104 5024 Me jpg jpg jpg jpg jpg.exe Explorer.EXE PID 5024 set thread context of 3104 5024 Me jpg jpg jpg jpg jpg.exe Explorer.EXE PID 4212 set thread context of 3104 4212 NETSTAT.EXE Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 4212 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
Me jpg jpg jpg jpg jpg.exeNETSTAT.EXEpid process 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE 4212 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3104 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Me jpg jpg jpg jpg jpg.exeNETSTAT.EXEpid process 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 5024 Me jpg jpg jpg jpg jpg.exe 4212 NETSTAT.EXE 4212 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Me jpg jpg jpg jpg jpg.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 5024 Me jpg jpg jpg jpg jpg.exe Token: SeDebugPrivilege 4212 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Me jpg jpg jpg jpg jpg.exeExplorer.EXEMe jpg jpg jpg jpg jpg.exeNETSTAT.EXEdescription pid process target process PID 872 wrote to memory of 5024 872 Me jpg jpg jpg jpg jpg.exe Me jpg jpg jpg jpg jpg.exe PID 872 wrote to memory of 5024 872 Me jpg jpg jpg jpg jpg.exe Me jpg jpg jpg jpg jpg.exe PID 872 wrote to memory of 5024 872 Me jpg jpg jpg jpg jpg.exe Me jpg jpg jpg jpg jpg.exe PID 872 wrote to memory of 5024 872 Me jpg jpg jpg jpg jpg.exe Me jpg jpg jpg jpg jpg.exe PID 872 wrote to memory of 5024 872 Me jpg jpg jpg jpg jpg.exe Me jpg jpg jpg jpg jpg.exe PID 872 wrote to memory of 5024 872 Me jpg jpg jpg jpg jpg.exe Me jpg jpg jpg jpg jpg.exe PID 3104 wrote to memory of 2932 3104 Explorer.EXE colorcpl.exe PID 3104 wrote to memory of 2932 3104 Explorer.EXE colorcpl.exe PID 3104 wrote to memory of 2932 3104 Explorer.EXE colorcpl.exe PID 5024 wrote to memory of 4212 5024 Me jpg jpg jpg jpg jpg.exe NETSTAT.EXE PID 5024 wrote to memory of 4212 5024 Me jpg jpg jpg jpg jpg.exe NETSTAT.EXE PID 5024 wrote to memory of 4212 5024 Me jpg jpg jpg jpg jpg.exe NETSTAT.EXE PID 4212 wrote to memory of 820 4212 NETSTAT.EXE cmd.exe PID 4212 wrote to memory of 820 4212 NETSTAT.EXE cmd.exe PID 4212 wrote to memory of 820 4212 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Me jpg jpg jpg jpg jpg.exe"C:\Users\Admin\AppData\Local\Temp\Me jpg jpg jpg jpg jpg.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Me jpg jpg jpg jpg jpg.exe"C:\Users\Admin\AppData\Local\Temp\Me jpg jpg jpg jpg jpg.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"4⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Me jpg jpg jpg jpg jpg.exe"5⤵PID:820
-
-
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵PID:2932
-