Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-07-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
General
-
Target
tmp.exe
-
Size
770KB
-
MD5
952e007eaae74fbdc16ba43932395b4b
-
SHA1
54fcb053d09600ffda2d4e95d050e7991a75acb0
-
SHA256
cad3c55468a545fa192d342b696c573a3d19c36673fd7524e982069fe3bb6109
-
SHA512
2dd973e9662f4eab0b7631df189b90cadf5ecf5ab2ee9a8f26d49e83040cf4666726a44047e355f404c3f9f776481eeec075734d52d00c5e39cc97b1ef135fb1
Malware Config
Extracted
formbook
4.1
s0s2
stripe-forecast.com
perfectingnextstage.com
primarole.com
nonnydesigns.com
wordsofweightandlevity.com
mafleursam.com
hardwarepicker.tech
minex-intl.com
thenextbigtech.net
rabeproject.com
sticktogracestudio.com
releve.space
readoku.net
carings.net
nasdaq-ex.store
au-techng.com
thethoughtgenius.com
how-to-learn-languages.net
kitabisabelanja.com
awndka.xyz
bretholdings.com
boscue.com
titantechmail.com
jadacomercializadora.com
shirtgse.online
derechoromano.com
yatirimtamam.com
gektolicompany.xyz
skyglowtech.com
67f5ead1a275.info
emnopgroup.com
lermontov.online
roshmary.com
goodandperfectgift.com
landliner.taxi
bhui7.com
barq-id.com
thevirtualcafe.net
176bwcx.com
zorbaplus.com
zzbb8899.xyz
magictvshow.com
serengetifadhions.com
ryzcn.com
amsordglobal.com
biznes-poznan24.xyz
globalepic10x.com
carrotshelter.com
keiwaseitai.online
energyecuador.net
kinsgtonbrass.com
cankaoao.com
mybullion.net
zjzcmy.net
businedstrack.com
mayipaimai.com
minijob-duesseldorf.net
gcpropolis.com
liwoo.top
glitzye.com
doca29.site
joselynbaezs.com
purchase614210.com
wojiayouxuan.com
dailycuatudong.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1524-61-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1524-62-0x000000000041F110-mapping.dmp formbook behavioral1/memory/1524-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1016-72-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook behavioral1/memory/1016-76-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1696 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tmp.exetmp.exerundll32.exedescription pid process target process PID 892 set thread context of 1524 892 tmp.exe tmp.exe PID 1524 set thread context of 1392 1524 tmp.exe Explorer.EXE PID 1016 set thread context of 1392 1016 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
tmp.exetmp.exerundll32.exepid process 892 tmp.exe 892 tmp.exe 892 tmp.exe 892 tmp.exe 892 tmp.exe 892 tmp.exe 892 tmp.exe 1524 tmp.exe 1524 tmp.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe 1016 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
tmp.exerundll32.exepid process 1524 tmp.exe 1524 tmp.exe 1524 tmp.exe 1016 rundll32.exe 1016 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tmp.exetmp.exerundll32.exedescription pid process Token: SeDebugPrivilege 892 tmp.exe Token: SeDebugPrivilege 1524 tmp.exe Token: SeDebugPrivilege 1016 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1392 Explorer.EXE 1392 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1392 Explorer.EXE 1392 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
tmp.exeExplorer.EXErundll32.exedescription pid process target process PID 892 wrote to memory of 1524 892 tmp.exe tmp.exe PID 892 wrote to memory of 1524 892 tmp.exe tmp.exe PID 892 wrote to memory of 1524 892 tmp.exe tmp.exe PID 892 wrote to memory of 1524 892 tmp.exe tmp.exe PID 892 wrote to memory of 1524 892 tmp.exe tmp.exe PID 892 wrote to memory of 1524 892 tmp.exe tmp.exe PID 892 wrote to memory of 1524 892 tmp.exe tmp.exe PID 1392 wrote to memory of 1016 1392 Explorer.EXE rundll32.exe PID 1392 wrote to memory of 1016 1392 Explorer.EXE rundll32.exe PID 1392 wrote to memory of 1016 1392 Explorer.EXE rundll32.exe PID 1392 wrote to memory of 1016 1392 Explorer.EXE rundll32.exe PID 1392 wrote to memory of 1016 1392 Explorer.EXE rundll32.exe PID 1392 wrote to memory of 1016 1392 Explorer.EXE rundll32.exe PID 1392 wrote to memory of 1016 1392 Explorer.EXE rundll32.exe PID 1016 wrote to memory of 1696 1016 rundll32.exe cmd.exe PID 1016 wrote to memory of 1696 1016 rundll32.exe cmd.exe PID 1016 wrote to memory of 1696 1016 rundll32.exe cmd.exe PID 1016 wrote to memory of 1696 1016 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/892-55-0x00000000002D0000-0x00000000002E6000-memory.dmpFilesize
88KB
-
memory/892-56-0x0000000007450000-0x00000000074BC000-memory.dmpFilesize
432KB
-
memory/892-57-0x0000000000CE0000-0x0000000000D14000-memory.dmpFilesize
208KB
-
memory/892-54-0x0000000001340000-0x000000000140A000-memory.dmpFilesize
808KB
-
memory/1016-67-0x0000000000000000-mapping.dmp
-
memory/1016-76-0x00000000000D0000-0x00000000000FF000-memory.dmpFilesize
188KB
-
memory/1016-74-0x0000000000B30000-0x0000000000BC3000-memory.dmpFilesize
588KB
-
memory/1016-73-0x00000000021F0000-0x00000000024F3000-memory.dmpFilesize
3.0MB
-
memory/1016-72-0x00000000000D0000-0x00000000000FF000-memory.dmpFilesize
188KB
-
memory/1016-71-0x0000000000690000-0x000000000069E000-memory.dmpFilesize
56KB
-
memory/1016-69-0x0000000075441000-0x0000000075443000-memory.dmpFilesize
8KB
-
memory/1392-66-0x0000000006B60000-0x0000000006C60000-memory.dmpFilesize
1024KB
-
memory/1392-75-0x00000000062A0000-0x0000000006365000-memory.dmpFilesize
788KB
-
memory/1392-77-0x00000000062A0000-0x0000000006365000-memory.dmpFilesize
788KB
-
memory/1524-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1524-65-0x0000000000170000-0x0000000000184000-memory.dmpFilesize
80KB
-
memory/1524-64-0x0000000000980000-0x0000000000C83000-memory.dmpFilesize
3.0MB
-
memory/1524-62-0x000000000041F110-mapping.dmp
-
memory/1524-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1524-59-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1524-58-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1696-70-0x0000000000000000-mapping.dmp