Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 14:02
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift Mesaji.exe
Resource
win7-20220414-en
General
-
Target
Ziraat Bankasi Swift Mesaji.exe
-
Size
469KB
-
MD5
25c2ebbd0e8c30072c147d523f0162f2
-
SHA1
d0ceb65655fc301e34c7750d1cb44908ae4a18ae
-
SHA256
859aada0cf09832daace8902102e39989f7eac7e3152006ea017a9f27e22b162
-
SHA512
2984620b54c2b541c378ae34572d73ee19943dee1d3ab8095c047f432f18b4e0a6715503e9108d838c72f9fc7f20712b4e3450f51dc01f3a5aad9552098967e0
Malware Config
Extracted
formbook
4.1
pr28
warehouseufohighbay.com
kingasia77.xyz
americanoutfittes.com
jemodaevangica.com
holigantv82.com
creamkidslife.com
skillzplanetoutreach.com
goldencityofficial.com
choiceaccessorise.com
kdgkzy.com
patra.tech
chicaglo.com
9491countyroad106.com
theultracleanser.com
lesmacarons.biz
kfaluminum.com
institutodiversidade.com
woodanqnmz.store
teslabuyerusa.com
cityofbastop.com
firegillibrand.com
npsyu5n-periv.com
nflstreams.pro
resuelve-deuda-latam-pro.com
281564.com
ezeehookz.com
rvestdewseherore.xyz
modderplaten.com
getdapp.xyz
tutsempire.com
scientiaimaging.com
cryptoriver-island.xyz
occidentalinn.net
decouvredesproduits.com
queensize.xyz
ipandu.net
yingxinyiyuan.com
suddeniink.com
guestwin.com
curahintstudio.xyz
5g00au.com
ncfirerestoration.com
diabeticlifeinsurancequotes.com
sex-intim-kropivnickiy.online
metashae.com
flora-kana.com
productsamerica.store
buliangdh90.xyz
georgiatourz.com
coveredbyaaa.com
wirethreepebble.com
jeffreygraper.com
temerecesunjamon.com
trynica.com
nubehost365.com
phulieumaytanbinh.com
bluprintthebrand.com
mitchellcafeteresa.com
longtorsoswimwear.com
savannahfengshui.com
0zc8l0.xyz
eby6.com
kantinuai.com
4kph.com
knottynikkibaby.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1076-59-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1076-60-0x000000000041F1C0-mapping.dmp formbook behavioral1/memory/1076-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1060-70-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook behavioral1/memory/1060-75-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.exeRegAsm.exerundll32.exedescription pid process target process PID 1100 set thread context of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1076 set thread context of 1400 1076 RegAsm.exe Explorer.EXE PID 1060 set thread context of 1400 1060 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
RegAsm.exerundll32.exepid process 1076 RegAsm.exe 1076 RegAsm.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegAsm.exerundll32.exepid process 1076 RegAsm.exe 1076 RegAsm.exe 1076 RegAsm.exe 1060 rundll32.exe 1060 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.exeRegAsm.exerundll32.exedescription pid process Token: SeDebugPrivilege 1100 Ziraat Bankasi Swift Mesaji.exe Token: SeDebugPrivilege 1076 RegAsm.exe Token: SeDebugPrivilege 1060 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1400 Explorer.EXE 1400 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1400 Explorer.EXE 1400 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.exeExplorer.EXErundll32.exedescription pid process target process PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1100 wrote to memory of 1076 1100 Ziraat Bankasi Swift Mesaji.exe RegAsm.exe PID 1400 wrote to memory of 1060 1400 Explorer.EXE rundll32.exe PID 1400 wrote to memory of 1060 1400 Explorer.EXE rundll32.exe PID 1400 wrote to memory of 1060 1400 Explorer.EXE rundll32.exe PID 1400 wrote to memory of 1060 1400 Explorer.EXE rundll32.exe PID 1400 wrote to memory of 1060 1400 Explorer.EXE rundll32.exe PID 1400 wrote to memory of 1060 1400 Explorer.EXE rundll32.exe PID 1400 wrote to memory of 1060 1400 Explorer.EXE rundll32.exe PID 1060 wrote to memory of 240 1060 rundll32.exe cmd.exe PID 1060 wrote to memory of 240 1060 rundll32.exe cmd.exe PID 1060 wrote to memory of 240 1060 rundll32.exe cmd.exe PID 1060 wrote to memory of 240 1060 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:240
-
-