Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2022 22:27
Static task
static1
Behavioral task
behavioral1
Sample
PO3117_002422.exe
Resource
win7-20220718-en
General
-
Target
PO3117_002422.exe
-
Size
11KB
-
MD5
a870810c6219011f00d22b6881c322b7
-
SHA1
3569ca5bd8eb29b3fdaa5fbf2209ea69d38428fc
-
SHA256
996e0d318e87eec169553d7a73048312946a95d9f07cb6f7ac01227955ad619c
-
SHA512
0a95e3cbb62f387fd078dc3c81cb944bde566baecb14642f580249cb4a054e2b5e024103150552636f8f2a030a00927ce425f8da2d9ce492bcbc466db09605f7
Malware Config
Extracted
formbook
4.1
df48
tinder.pw
flowersfoodsbrands.net
broadbandbangalore.com
wittyhealthy.com
mediking.online
pounchbowl.com
gridkart.com
mobrtho.com
starlinerecruitment.com
ernieswinesandliquors.com
dsbvgf.com
messiahbaptist.church
sumsandals.com
familieheineken.online
fikifika.com
beg.wtf
euroconsult.net
radiologist24.com
fuji-privatevilla.com
flemming.store
simplymanaged.rentals
pnsrjp.com
platinumedicaladmin.com
walleti.tech
sayingcoxy.com
flowersfooods.net
forekshesabiolustur.com
wesvon.online
symphonycontest.com
startup-int.com
xn--evgvenliksistemleri-79b.com
thevirtualghost.com
bjjdating.com
gaff.pet
xenoinvest.com
manpowernews.net
psychedelicexpertshop.com
blackrockf.com
seacliffdogwalking.com
bapakmu21.com
bldgops.com
finestbrieftoperceivetoday.info
trizzle.xyz
youeve.com
hikachika.com
utahprabrasileiros.com
dwez.net
hotelpatasycolas.com
trapanibedbreakfast.com
customerchoicehomes.com
openup.design
muwilp.com
digitslot777.net
torrestreet.com
lowerrates.site
shema.pro
musicbylionel.com
mixasia.net
rupting.com
idol-d.com
fbinternettrackingettlement.com
vernonriverchurch.net
kaseybabe.com
dowupkeep.com
bmtd.net
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3736-136-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3736-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4668-146-0x00000000005B0000-0x00000000005DF000-memory.dmp formbook behavioral2/memory/4668-149-0x00000000005B0000-0x00000000005DF000-memory.dmp formbook -
Drops startup file 2 IoCs
Processes:
PO3117_002422.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO3117_002422.exe PO3117_002422.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO3117_002422.exe PO3117_002422.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO3117_002422.exePO3117_002422.exeipconfig.exedescription pid process target process PID 908 set thread context of 3736 908 PO3117_002422.exe PO3117_002422.exe PID 3736 set thread context of 3064 3736 PO3117_002422.exe Explorer.EXE PID 4668 set thread context of 3064 4668 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 4668 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
PO3117_002422.exePO3117_002422.exeipconfig.exepid process 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 908 PO3117_002422.exe 3736 PO3117_002422.exe 3736 PO3117_002422.exe 3736 PO3117_002422.exe 3736 PO3117_002422.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe 4668 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3064 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PO3117_002422.exeipconfig.exepid process 3736 PO3117_002422.exe 3736 PO3117_002422.exe 3736 PO3117_002422.exe 4668 ipconfig.exe 4668 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO3117_002422.exePO3117_002422.exeipconfig.exedescription pid process Token: SeDebugPrivilege 908 PO3117_002422.exe Token: SeDebugPrivilege 3736 PO3117_002422.exe Token: SeDebugPrivilege 4668 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PO3117_002422.exeExplorer.EXEipconfig.exedescription pid process target process PID 908 wrote to memory of 3736 908 PO3117_002422.exe PO3117_002422.exe PID 908 wrote to memory of 3736 908 PO3117_002422.exe PO3117_002422.exe PID 908 wrote to memory of 3736 908 PO3117_002422.exe PO3117_002422.exe PID 908 wrote to memory of 3736 908 PO3117_002422.exe PO3117_002422.exe PID 908 wrote to memory of 3736 908 PO3117_002422.exe PO3117_002422.exe PID 908 wrote to memory of 3736 908 PO3117_002422.exe PO3117_002422.exe PID 3064 wrote to memory of 4668 3064 Explorer.EXE ipconfig.exe PID 3064 wrote to memory of 4668 3064 Explorer.EXE ipconfig.exe PID 3064 wrote to memory of 4668 3064 Explorer.EXE ipconfig.exe PID 4668 wrote to memory of 1308 4668 ipconfig.exe cmd.exe PID 4668 wrote to memory of 1308 4668 ipconfig.exe cmd.exe PID 4668 wrote to memory of 1308 4668 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\PO3117_002422.exe"C:\Users\Admin\AppData\Local\Temp\PO3117_002422.exe"2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\PO3117_002422.exe"C:\Users\Admin\AppData\Local\Temp\PO3117_002422.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO3117_002422.exe"3⤵PID:1308
-
-