Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:16
Static task
static1
Behavioral task
behavioral1
Sample
REQUERIDA.exe
Resource
win7-20220414-en
General
-
Target
REQUERIDA.exe
-
Size
500KB
-
MD5
e07d5b6d29e7cae1ea8546b4783601b8
-
SHA1
d5c823bdee28ccf2bd18e683eca270d6c031cb72
-
SHA256
3ec51daa2ad133cfcdce1ffca7081f96ee58d9b5c2d302cee732e6e2cc3d8cc6
-
SHA512
adf6f6b1a142d17df561d7181c6d4a1e3d6b8663fdfde5f2ae72459cadd63f7daf72a6d6d5233071a2af9a7be7f2f7a10d05aabe20db258826bcf2b401e5124c
Malware Config
Extracted
formbook
4.1
m5gz
provtanks.com
partybuskingz.com
viewtechborescopes.com
larepco.info
lacuartetera.net
rpueuetd.com
maximalneoptimalne.com
gravitywavegame.com
kencoxvaspecialist.com
mein-markisenland-ev.com
cannachocolata.com
themeatsheet.com
emarketschool.com
fastinternet.systems
fxqlf.com
pixanliber.com
omgree.com
delraybees.com
hbamicrosupport.com
ginlj.info
arnis.restaurant
oxygenemonde.com
biqaqx.info
0pe830.com
mhitechnologies.com
wrn23internetradio.com
gaoshiqing.site
sandratomoakland.com
libcards.com
arhardwoods.com
shmbwithcoachlanetta.com
stuci.cloud
traders-forex.net
wanli5988.com
sj56666.com
641028.com
furnituredaytonabeach.com
realmugshotmugs.com
live2attain.com
daniels-mpvcondominium.com
mrtmaps.com
dragonmanialegendshacked.net
an-pvs.com
bloomfieldbarkers.com
diamantrosedelordrecosmic.com
advertisingtrust.net
fhj4tl.info
ondasnack.net
faenfarang.com
9smam.com
ppl-ubdate-info.com
grandmascozyhouse.com
solkliniken.com
aroundlog.com
sundainty.com
ralphvartan.com
mywebsiteswork.com
rehabloops.com
adysw.com
sscptzst.com
ephraimg.com
nuanqi08.com
goodyearpoolbuilding.com
h35bmfkq-i96r.com
joomlas123.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3164-136-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/3404-143-0x0000000000350000-0x000000000037D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
REQUERIDA.exeREQUERIDA.execmstp.exedescription pid process target process PID 3816 set thread context of 3164 3816 REQUERIDA.exe REQUERIDA.exe PID 3164 set thread context of 3120 3164 REQUERIDA.exe Explorer.EXE PID 3404 set thread context of 3120 3404 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
REQUERIDA.exeREQUERIDA.execmstp.exepid process 3816 REQUERIDA.exe 3816 REQUERIDA.exe 3816 REQUERIDA.exe 3164 REQUERIDA.exe 3164 REQUERIDA.exe 3164 REQUERIDA.exe 3164 REQUERIDA.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe 3404 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3120 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
REQUERIDA.execmstp.exepid process 3164 REQUERIDA.exe 3164 REQUERIDA.exe 3164 REQUERIDA.exe 3404 cmstp.exe 3404 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
REQUERIDA.exeREQUERIDA.execmstp.exedescription pid process Token: SeDebugPrivilege 3816 REQUERIDA.exe Token: SeDebugPrivilege 3164 REQUERIDA.exe Token: SeDebugPrivilege 3404 cmstp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
REQUERIDA.exeExplorer.EXEcmstp.exedescription pid process target process PID 3816 wrote to memory of 3164 3816 REQUERIDA.exe REQUERIDA.exe PID 3816 wrote to memory of 3164 3816 REQUERIDA.exe REQUERIDA.exe PID 3816 wrote to memory of 3164 3816 REQUERIDA.exe REQUERIDA.exe PID 3816 wrote to memory of 3164 3816 REQUERIDA.exe REQUERIDA.exe PID 3816 wrote to memory of 3164 3816 REQUERIDA.exe REQUERIDA.exe PID 3816 wrote to memory of 3164 3816 REQUERIDA.exe REQUERIDA.exe PID 3120 wrote to memory of 3404 3120 Explorer.EXE cmstp.exe PID 3120 wrote to memory of 3404 3120 Explorer.EXE cmstp.exe PID 3120 wrote to memory of 3404 3120 Explorer.EXE cmstp.exe PID 3404 wrote to memory of 1068 3404 cmstp.exe cmd.exe PID 3404 wrote to memory of 1068 3404 cmstp.exe cmd.exe PID 3404 wrote to memory of 1068 3404 cmstp.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REQUERIDA.exe"C:\Users\Admin\AppData\Local\Temp\REQUERIDA.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\REQUERIDA.exe"C:\Users\Admin\AppData\Local\Temp\REQUERIDA.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\REQUERIDA.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1068-144-0x0000000000000000-mapping.dmp
-
memory/3120-147-0x0000000008510000-0x0000000008613000-memory.dmpFilesize
1.0MB
-
memory/3120-140-0x0000000003200000-0x0000000003349000-memory.dmpFilesize
1.3MB
-
memory/3164-139-0x0000000001950000-0x0000000001964000-memory.dmpFilesize
80KB
-
memory/3164-138-0x00000000019C0000-0x0000000001D0A000-memory.dmpFilesize
3.3MB
-
memory/3164-135-0x0000000000000000-mapping.dmp
-
memory/3164-136-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3404-142-0x0000000000FB0000-0x0000000000FC6000-memory.dmpFilesize
88KB
-
memory/3404-141-0x0000000000000000-mapping.dmp
-
memory/3404-143-0x0000000000350000-0x000000000037D000-memory.dmpFilesize
180KB
-
memory/3404-145-0x00000000025A0000-0x00000000028EA000-memory.dmpFilesize
3.3MB
-
memory/3404-146-0x0000000000E70000-0x0000000000F03000-memory.dmpFilesize
588KB
-
memory/3816-134-0x0000000007C60000-0x0000000007C6A000-memory.dmpFilesize
40KB
-
memory/3816-133-0x0000000007D50000-0x0000000007DEC000-memory.dmpFilesize
624KB
-
memory/3816-130-0x0000000000B10000-0x0000000000B94000-memory.dmpFilesize
528KB
-
memory/3816-131-0x0000000008080000-0x0000000008624000-memory.dmpFilesize
5.6MB
-
memory/3816-132-0x0000000007CB0000-0x0000000007D42000-memory.dmpFilesize
584KB