Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 12:03
Static task
static1
Behavioral task
behavioral1
Sample
Invoices,Pictures jpg jpg jpg jpg.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Invoices,Pictures jpg jpg jpg jpg.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Me jpg jpg jpg jpg.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Me jpg jpg jpg jpg.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Products Order pdf pdf pdf pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Products Order pdf pdf pdf pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
Me jpg jpg jpg jpg.exe
-
Size
550KB
-
MD5
b341988d42a31ad31f64902f802be8cb
-
SHA1
dcb84aa283342301808bb227d0f768036cccc89a
-
SHA256
f80c8e9d0e8ed0ffa6b7d8620a0eb890deb7c9dc84dca3198b3d2625bf5d1099
-
SHA512
97a260e43f2f77c57d46765d837df1bfa7bbbd27d4e3b8d17a63d68872429301b1be7fa5a735f0a37d7750a63ec98b242a93e7bb6be8ca9a7c9c289fd7b80c32
Malware Config
Extracted
formbook
4.1
hha
atarairdive.com
binanca.com
krepostta-sofia.com
chiangmaipartys.com
bestglobalseo.com
rdsri.com
immaginaeventi.com
lushrox.com
kenderia.com
goldenbrownacademy.com
kiddyquest.com
cs-support.online
magicovino.com
banderasacuadros.com
originalducatispareparts.com
tfpfleet.com
wickedmaple.com
fasypeoplesearch.com
zggwpmwdcp.com
boav11.com
development88.com
naturestourssrilanka.com
fertycc.info
messenger-marketing.biz
gloucesterchauffeurs.com
gdhawell.com
paymejo.com
preparedtrafficupdates.win
youpinpuzi.com
gweneldor.tech
110408.info
19mosaics.com
radyoajanda.net
photographyhere-now.com
clickoncr.com
safeenamedia.com
jh3.tech
darinsfault.net
jbrwcfn.com
trandway.com
copecafe.net
mansourmall.com
chiyodaku-fudosan.com
idealgrphics.com
coldwardecor.com
airfan-video.com
mfash.info
zebrometer.com
hummingbirdindustries.info
buylasvegasluxury.com
blondsthlm.com
guggenheimre.com
savethewoodie.info
museumscreens.com
goodplacelotto.com
snackans.com
estimergia.com
laacia.life
swtsthotel.com
btcass.com
thewatchknight.com
bangladesherkhobor.net
sulphurinsatisfaction.com
casa-rural-cadiz.com
yofdyk.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/1452-137-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral4/memory/1452-142-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral4/memory/2312-148-0x0000000000EA0000-0x0000000000ECD000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Me jpg jpg jpg jpg.exeMSBuild.exechkdsk.exedescription pid process target process PID 2124 set thread context of 1452 2124 Me jpg jpg jpg jpg.exe MSBuild.exe PID 1452 set thread context of 2604 1452 MSBuild.exe Explorer.EXE PID 1452 set thread context of 2604 1452 MSBuild.exe Explorer.EXE PID 2312 set thread context of 2604 2312 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
MSBuild.exechkdsk.exepid process 1452 MSBuild.exe 1452 MSBuild.exe 1452 MSBuild.exe 1452 MSBuild.exe 1452 MSBuild.exe 1452 MSBuild.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe 2312 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MSBuild.exechkdsk.exepid process 1452 MSBuild.exe 1452 MSBuild.exe 1452 MSBuild.exe 1452 MSBuild.exe 2312 chkdsk.exe 2312 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MSBuild.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1452 MSBuild.exe Token: SeDebugPrivilege 2312 chkdsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Me jpg jpg jpg jpg.exeMSBuild.exechkdsk.exedescription pid process target process PID 2124 wrote to memory of 1452 2124 Me jpg jpg jpg jpg.exe MSBuild.exe PID 2124 wrote to memory of 1452 2124 Me jpg jpg jpg jpg.exe MSBuild.exe PID 2124 wrote to memory of 1452 2124 Me jpg jpg jpg jpg.exe MSBuild.exe PID 2124 wrote to memory of 1452 2124 Me jpg jpg jpg jpg.exe MSBuild.exe PID 2124 wrote to memory of 1452 2124 Me jpg jpg jpg jpg.exe MSBuild.exe PID 2124 wrote to memory of 1452 2124 Me jpg jpg jpg jpg.exe MSBuild.exe PID 1452 wrote to memory of 2312 1452 MSBuild.exe chkdsk.exe PID 1452 wrote to memory of 2312 1452 MSBuild.exe chkdsk.exe PID 1452 wrote to memory of 2312 1452 MSBuild.exe chkdsk.exe PID 2312 wrote to memory of 756 2312 chkdsk.exe cmd.exe PID 2312 wrote to memory of 756 2312 chkdsk.exe cmd.exe PID 2312 wrote to memory of 756 2312 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Me jpg jpg jpg jpg.exe"C:\Users\Admin\AppData\Local\Temp\Me jpg jpg jpg jpg.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"4⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:756
-
-
-
-