Analysis
-
max time kernel
186s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
01-08-2022 15:11
Static task
static1
Behavioral task
behavioral1
Sample
ZB_1997e758e3.exe
Resource
win7-20220718-en
General
-
Target
ZB_1997e758e3.exe
-
Size
487KB
-
MD5
25d40c676222d431691223ea256c5be0
-
SHA1
844e84f81a6fcb00af333793bccdf960377dd7d0
-
SHA256
76b075d9a92f124e01df0a2c3f86ea729666db05b813d499fb3ce6d2402f42d9
-
SHA512
1e140f4427fd5989b28827169126445c2bf7a8059a3279fa419c9d8280998e1c005234d1a5c3bf87a79d527adf153ccf199e070a0ae9ab2bef62437d3fd76161
Malware Config
Extracted
formbook
4.1
mh76
healthgovcalottery.net
wenxinliao.com
rooterphd.com
bbobbo.one
american-mes-de-dezembro.xyz
mintager.com
thespecialtstore.com
wemakegreenhomes.com
occurandmental.xyz
fidelityrealtytitle.com
numerisat.asia
wearestallions.com
supxl.com
rajacumi.com
renaziv.online
blixtindustries.com
fjljq.com
exploretrivenicamping.com
authenticusspa.com
uucloud.press
conclaveraleighapts.com
moqaq.com
graphicressie.com
homebest.online
yisaco.com
thedrybonesareawakening.com
browardhomeappraisal.com
xn--agroisleos-09a.com
clinchrecovery.com
rekoladev.com
mlbl1.xyz
tunecaring.com
avconstant.com
chelseavictorioustravels.com
esrfy.xyz
frijolitoswey.com
zsfsidltd.com
natashasadler.com
kice1.xyz
drivemytrains.xyz
shopalthosa.xyz
merendri.com
yetkiliveznem7.xyz
milestonesconstruction.com
apparodeoexpos.com
momotou.xyz
chatkhoneh.com
cacconsults.com
kigif-indonesia.com
segurambiental.com
verynicegirls.com
curearrow.com
fdupcoffee.com
theclevergolfers.com
moushimonster.com
qdchuangyedaikuan.com
hopefortodayrecovery.com
wk6agoboyxg6.xyz
giybetfm.com
completedn.xyz
eluawastudio.com
legacysportsusatexas.com
comgmaik.com
intelsearchtech.com
northpierangling.info
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/732-60-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/732-61-0x000000000041F1A0-mapping.dmp formbook behavioral1/memory/732-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1672-71-0x00000000000E0000-0x000000000010F000-memory.dmp formbook behavioral1/memory/1672-75-0x00000000000E0000-0x000000000010F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ZB_1997e758e3.exeInstallUtil.exerundll32.exedescription pid process target process PID 896 set thread context of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 732 set thread context of 1412 732 InstallUtil.exe Explorer.EXE PID 1672 set thread context of 1412 1672 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
ZB_1997e758e3.exeInstallUtil.exerundll32.exepid process 896 ZB_1997e758e3.exe 896 ZB_1997e758e3.exe 732 InstallUtil.exe 732 InstallUtil.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
InstallUtil.exerundll32.exepid process 732 InstallUtil.exe 732 InstallUtil.exe 732 InstallUtil.exe 1672 rundll32.exe 1672 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
ZB_1997e758e3.exeInstallUtil.exerundll32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 896 ZB_1997e758e3.exe Token: SeDebugPrivilege 732 InstallUtil.exe Token: SeDebugPrivilege 1672 rundll32.exe Token: SeShutdownPrivilege 1412 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
ZB_1997e758e3.exeExplorer.EXErundll32.exedescription pid process target process PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 896 wrote to memory of 732 896 ZB_1997e758e3.exe InstallUtil.exe PID 1412 wrote to memory of 1672 1412 Explorer.EXE rundll32.exe PID 1412 wrote to memory of 1672 1412 Explorer.EXE rundll32.exe PID 1412 wrote to memory of 1672 1412 Explorer.EXE rundll32.exe PID 1412 wrote to memory of 1672 1412 Explorer.EXE rundll32.exe PID 1412 wrote to memory of 1672 1412 Explorer.EXE rundll32.exe PID 1412 wrote to memory of 1672 1412 Explorer.EXE rundll32.exe PID 1412 wrote to memory of 1672 1412 Explorer.EXE rundll32.exe PID 1672 wrote to memory of 1520 1672 rundll32.exe cmd.exe PID 1672 wrote to memory of 1520 1672 rundll32.exe cmd.exe PID 1672 wrote to memory of 1520 1672 rundll32.exe cmd.exe PID 1672 wrote to memory of 1520 1672 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ZB_1997e758e3.exe"C:\Users\Admin\AppData\Local\Temp\ZB_1997e758e3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/732-65-0x00000000001E0000-0x00000000001F5000-memory.dmpFilesize
84KB
-
memory/732-58-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/732-57-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/732-64-0x0000000000870000-0x0000000000B73000-memory.dmpFilesize
3.0MB
-
memory/732-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/732-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/732-61-0x000000000041F1A0-mapping.dmp
-
memory/896-54-0x0000000000C70000-0x0000000000CF0000-memory.dmpFilesize
512KB
-
memory/896-56-0x0000000004670000-0x0000000004702000-memory.dmpFilesize
584KB
-
memory/896-55-0x0000000004580000-0x00000000045F8000-memory.dmpFilesize
480KB
-
memory/1412-76-0x0000000006A70000-0x0000000006B2C000-memory.dmpFilesize
752KB
-
memory/1412-66-0x0000000006280000-0x0000000006363000-memory.dmpFilesize
908KB
-
memory/1412-74-0x0000000006A70000-0x0000000006B2C000-memory.dmpFilesize
752KB
-
memory/1520-69-0x0000000000000000-mapping.dmp
-
memory/1672-70-0x0000000000F30000-0x0000000000F3E000-memory.dmpFilesize
56KB
-
memory/1672-71-0x00000000000E0000-0x000000000010F000-memory.dmpFilesize
188KB
-
memory/1672-72-0x0000000002340000-0x0000000002643000-memory.dmpFilesize
3.0MB
-
memory/1672-73-0x0000000000970000-0x0000000000A04000-memory.dmpFilesize
592KB
-
memory/1672-67-0x0000000000000000-mapping.dmp
-
memory/1672-75-0x00000000000E0000-0x000000000010F000-memory.dmpFilesize
188KB
-
memory/1672-68-0x0000000075851000-0x0000000075853000-memory.dmpFilesize
8KB