Analysis
-
max time kernel
159s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 15:11
Static task
static1
Behavioral task
behavioral1
Sample
ZB_1997e758e3.exe
Resource
win7-20220718-en
General
-
Target
ZB_1997e758e3.exe
-
Size
487KB
-
MD5
25d40c676222d431691223ea256c5be0
-
SHA1
844e84f81a6fcb00af333793bccdf960377dd7d0
-
SHA256
76b075d9a92f124e01df0a2c3f86ea729666db05b813d499fb3ce6d2402f42d9
-
SHA512
1e140f4427fd5989b28827169126445c2bf7a8059a3279fa419c9d8280998e1c005234d1a5c3bf87a79d527adf153ccf199e070a0ae9ab2bef62437d3fd76161
Malware Config
Extracted
formbook
4.1
mh76
healthgovcalottery.net
wenxinliao.com
rooterphd.com
bbobbo.one
american-mes-de-dezembro.xyz
mintager.com
thespecialtstore.com
wemakegreenhomes.com
occurandmental.xyz
fidelityrealtytitle.com
numerisat.asia
wearestallions.com
supxl.com
rajacumi.com
renaziv.online
blixtindustries.com
fjljq.com
exploretrivenicamping.com
authenticusspa.com
uucloud.press
conclaveraleighapts.com
moqaq.com
graphicressie.com
homebest.online
yisaco.com
thedrybonesareawakening.com
browardhomeappraisal.com
xn--agroisleos-09a.com
clinchrecovery.com
rekoladev.com
mlbl1.xyz
tunecaring.com
avconstant.com
chelseavictorioustravels.com
esrfy.xyz
frijolitoswey.com
zsfsidltd.com
natashasadler.com
kice1.xyz
drivemytrains.xyz
shopalthosa.xyz
merendri.com
yetkiliveznem7.xyz
milestonesconstruction.com
apparodeoexpos.com
momotou.xyz
chatkhoneh.com
cacconsults.com
kigif-indonesia.com
segurambiental.com
verynicegirls.com
curearrow.com
fdupcoffee.com
theclevergolfers.com
moushimonster.com
qdchuangyedaikuan.com
hopefortodayrecovery.com
wk6agoboyxg6.xyz
giybetfm.com
completedn.xyz
eluawastudio.com
legacysportsusatexas.com
comgmaik.com
intelsearchtech.com
northpierangling.info
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3912-135-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3912-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5108-143-0x0000000001200000-0x000000000122F000-memory.dmp formbook behavioral2/memory/5108-146-0x0000000001200000-0x000000000122F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ZB_1997e758e3.exeInstallUtil.execscript.exedescription pid process target process PID 4888 set thread context of 3912 4888 ZB_1997e758e3.exe InstallUtil.exe PID 3912 set thread context of 3036 3912 InstallUtil.exe Explorer.EXE PID 5108 set thread context of 3036 5108 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
ZB_1997e758e3.exeInstallUtil.execscript.exepid process 4888 ZB_1997e758e3.exe 4888 ZB_1997e758e3.exe 4888 ZB_1997e758e3.exe 3912 InstallUtil.exe 3912 InstallUtil.exe 3912 InstallUtil.exe 3912 InstallUtil.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe 5108 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3036 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
InstallUtil.execscript.exepid process 3912 InstallUtil.exe 3912 InstallUtil.exe 3912 InstallUtil.exe 5108 cscript.exe 5108 cscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ZB_1997e758e3.exeInstallUtil.execscript.exedescription pid process Token: SeDebugPrivilege 4888 ZB_1997e758e3.exe Token: SeDebugPrivilege 3912 InstallUtil.exe Token: SeDebugPrivilege 5108 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ZB_1997e758e3.exeExplorer.EXEcscript.exedescription pid process target process PID 4888 wrote to memory of 3912 4888 ZB_1997e758e3.exe InstallUtil.exe PID 4888 wrote to memory of 3912 4888 ZB_1997e758e3.exe InstallUtil.exe PID 4888 wrote to memory of 3912 4888 ZB_1997e758e3.exe InstallUtil.exe PID 4888 wrote to memory of 3912 4888 ZB_1997e758e3.exe InstallUtil.exe PID 4888 wrote to memory of 3912 4888 ZB_1997e758e3.exe InstallUtil.exe PID 4888 wrote to memory of 3912 4888 ZB_1997e758e3.exe InstallUtil.exe PID 3036 wrote to memory of 5108 3036 Explorer.EXE cscript.exe PID 3036 wrote to memory of 5108 3036 Explorer.EXE cscript.exe PID 3036 wrote to memory of 5108 3036 Explorer.EXE cscript.exe PID 5108 wrote to memory of 4528 5108 cscript.exe cmd.exe PID 5108 wrote to memory of 4528 5108 cscript.exe cmd.exe PID 5108 wrote to memory of 4528 5108 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ZB_1997e758e3.exe"C:\Users\Admin\AppData\Local\Temp\ZB_1997e758e3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3036-139-0x0000000008890000-0x00000000089FB000-memory.dmpFilesize
1.4MB
-
memory/3036-149-0x0000000008AF0000-0x0000000008C0C000-memory.dmpFilesize
1.1MB
-
memory/3036-148-0x0000000008AF0000-0x0000000008C0C000-memory.dmpFilesize
1.1MB
-
memory/3912-141-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3912-135-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3912-138-0x0000000000FD0000-0x0000000000FE5000-memory.dmpFilesize
84KB
-
memory/3912-134-0x0000000000000000-mapping.dmp
-
memory/3912-137-0x00000000010A0000-0x00000000013EA000-memory.dmpFilesize
3.3MB
-
memory/4528-144-0x0000000000000000-mapping.dmp
-
memory/4888-133-0x0000000005E40000-0x0000000005E62000-memory.dmpFilesize
136KB
-
memory/4888-132-0x0000000000FB0000-0x0000000001030000-memory.dmpFilesize
512KB
-
memory/5108-143-0x0000000001200000-0x000000000122F000-memory.dmpFilesize
188KB
-
memory/5108-145-0x0000000003200000-0x000000000354A000-memory.dmpFilesize
3.3MB
-
memory/5108-146-0x0000000001200000-0x000000000122F000-memory.dmpFilesize
188KB
-
memory/5108-147-0x00000000030A0000-0x0000000003134000-memory.dmpFilesize
592KB
-
memory/5108-142-0x0000000000AC0000-0x0000000000AE7000-memory.dmpFilesize
156KB
-
memory/5108-140-0x0000000000000000-mapping.dmp