Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-09-2022 11:16
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe
-
Size
975KB
-
MD5
5c5f6418364d135500080bcbaecf1be1
-
SHA1
718544eece57175e5d34e8f2c02264ffd08cc98a
-
SHA256
44db6b3b48500386767c3b65e1ccc784a41108486ff999a8d3be6e97b828ab87
-
SHA512
3484ab14148aa6b370dc1f789e6e5b0fcb54ef7bda2f0d73bb701c7acc03fc61afb106b15d57f8332a4359331abf080e0cdf42ee0dfb52e0f72b36203c3bd90f
-
SSDEEP
12288:Mi8HjEB1mpzdFnoIvtUg2jIEsnciI50wv2ykDooyZGbR48yArhf7fvqd2222222P:MvD+mpzdCIvtUjmnzfXooX48yAlv
Malware Config
Extracted
formbook
od65
vWv++sZuMcvF33G4l6XP9EZPtA==
t5BN04mkc6x7eQtgS2Cny1c74wh2JQ==
ZTwBHxvcOi/zDyg=
HwPQCRbYNSbYx9YwkxE7M8jD
zrZ7kYRUKtRvsNwuQoroFy2XBerx1ZfW
x5kgkNmETMWdsMcOWt8=
U0nl/edTCD8CML781w==
eC3RNeH20QR4+QB6
p41iGJpixNsjiSetfNP4Xw==
EgiwGUUP9OJdsjqZh4WLohiTERg=
vKx/M5lOHMDiAarHuukJ
im4Rsi5OGk2Qv9cjI2fC+gReNuXeksU=
dynF4YrQWXXHLMxHG1yVAZNvIO/x1ZfW
5pYrnPK8nt07O4mUm9c=
+tdo4GF+OlqJwtwXcP9Da1H1sBA=
zaoxtveyMFwVVFy/GaHFTfl3EbqsGInQ
Dth/Hns1tuE1cJwjk1SkP0w74wh2JQ==
9LJY/i/hzC/zDyg=
/eZh3RKaXKLXGG1kvkZs5m4=
o31J4w2cWOhJP4mUm9c=
U03tDQL6yAVoe/c5Rx1POWA=
dUTQuWEa4P94+QB6
NwzdkgPSrdaR9l+k8DYc
650uEwAV7JKtHo7Zr8MW
tGYlVTHs2n4HLImUm9c=
/sJPb6PBjiwxZKzwyQ==
LgyepaBAkn4dCBZ4keRId1H1sBA=
sJuCH2DRjncruV9g8KTI9EZPtA==
mI5KvPGpvxCPqLz+WN8=
mkLJy20V436NskZZv5s7M8jD
tZYKtEALx8Stmw==
gVv/KEA3XphT
RvmgQarKu2Df7k+S87AW
TBynQbKCW/gjgZDTH7cSX4H10m0en88=
lGA142qAXvLECRhb4S8e
ynwNkT9vQGk9ZKzwyQ==
Xz3yiO+H7CNy2Wu3l6LE9EZPtA==
IeySB46ugefNDjE=
Rg7K+f+6ES4Cd5UPoT5u4GbcPiYl5I3P
OAPqp+UF95kTQSTYX7Pt+YRKrA==
NQjE9OW7iKPjLlphD5ac+24=
8tRxG2MpJdls2Ms23g==
75wzLh8v8hvZJUPEC1xnwV074wh2JQ==
X1LvkUcVx8Stmw==
YBWvx6H7gZBO
aC7U+eKY7/94+QB6
hTO7H1Ag8gYxbfJ5iox8te6Ge1IR
67A94W4ypeTZCBxb4S8e
xaZJN+OdktOR91+k8DYc
sXkAgC33T2i/ZKzwyQ==
L+KcM6fXz3EYweVw
EO3Cza9dvuG2BRhb4S8e
Ac6hVbZuRXYErM5j
UBbXuZ+oeycxZKzwyQ==
jW5OmJU3XphT
XTi/18ByQuV6udvotIOaIz064wh2JQ==
h3VK7FcXd5R9flRkR1Vo0Oz0ZN5XSq0CCA==
FfSTKoENznyOnTa1p6gqR2Y=
s2HsijNYFrV4+QB6
9sxQ3SfVl//VEDU=
2axR/2sNa6i17orAq7XN9EZPtA==
KvPIZrJ0T3y/ZKzwyQ==
OhvOnEVcGE42ZKzwyQ==
tm1B4QmZ7xZ8duVbScA=
ideonaut.org
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 58 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-56-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-57-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-58-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-59-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-60-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-61-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-62-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-63-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-64-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-65-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-67-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-66-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-69-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-70-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-72-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-76-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-77-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-80-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-85-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-84-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-83-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-82-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-81-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-79-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-78-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-75-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-74-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-73-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-71-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-68-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-86-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-93-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-97-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-99-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-98-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-100-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-102-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-103-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-105-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-104-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-101-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-96-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-95-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-94-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-92-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-91-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-90-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-89-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-88-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-87-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-106-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-107-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-108-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-116-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-117-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-118-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-119-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 behavioral1/memory/1736-120-0x0000000001F60000-0x0000000001FC1000-memory.dmp modiloader_stage2 -
Loads dropped DLL 1 IoCs
Processes:
help.exepid process 364 help.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
iexpress.exehelp.exedescription pid process target process PID 1752 set thread context of 1392 1752 iexpress.exe Explorer.EXE PID 364 set thread context of 1392 364 help.exe Explorer.EXE -
Processes:
help.exedescription ioc process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Processes:
SecuriteInfo.com.W32.Formbook.AA.tr.17194.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
SecuriteInfo.com.W32.Formbook.AA.tr.17194.exeiexpress.exehelp.exepid process 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe 1752 iexpress.exe 1752 iexpress.exe 1752 iexpress.exe 1752 iexpress.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
iexpress.exehelp.exepid process 1752 iexpress.exe 1752 iexpress.exe 1752 iexpress.exe 364 help.exe 364 help.exe 364 help.exe 364 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
iexpress.exeExplorer.EXEhelp.exedescription pid process Token: SeDebugPrivilege 1752 iexpress.exe Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeDebugPrivilege 364 help.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
SecuriteInfo.com.W32.Formbook.AA.tr.17194.exeExplorer.EXEhelp.exedescription pid process target process PID 1736 wrote to memory of 1752 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe iexpress.exe PID 1736 wrote to memory of 1752 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe iexpress.exe PID 1736 wrote to memory of 1752 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe iexpress.exe PID 1736 wrote to memory of 1752 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe iexpress.exe PID 1736 wrote to memory of 1752 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe iexpress.exe PID 1736 wrote to memory of 1752 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe iexpress.exe PID 1736 wrote to memory of 1752 1736 SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe iexpress.exe PID 1392 wrote to memory of 364 1392 Explorer.EXE help.exe PID 1392 wrote to memory of 364 1392 Explorer.EXE help.exe PID 1392 wrote to memory of 364 1392 Explorer.EXE help.exe PID 1392 wrote to memory of 364 1392 Explorer.EXE help.exe PID 364 wrote to memory of 320 364 help.exe Firefox.exe PID 364 wrote to memory of 320 364 help.exe Firefox.exe PID 364 wrote to memory of 320 364 help.exe Firefox.exe PID 364 wrote to memory of 320 364 help.exe Firefox.exe PID 364 wrote to memory of 320 364 help.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Formbook.AA.tr.17194.exe"2⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\iexpress.exeiexpress3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\sqlite3.dllFilesize
832KB
MD507fb6d31f37fb1b4164bef301306c288
SHA14cb41af6d63a07324ef6b18b1a1f43ce94e25626
SHA25606ddf0a370af00d994824605a8e1307ba138f89b2d864539f0d19e8804edac02
SHA512cab4a7c5805b80851aba5f2c9b001fabc1416f6648d891f49eacc81fe79287c5baa01306a42298da722750b812a4ea85388ffae9200dcf656dd1d5b5b9323353
-
memory/364-180-0x0000000000080000-0x00000000000AD000-memory.dmpFilesize
180KB
-
memory/364-178-0x0000000000540000-0x00000000005CF000-memory.dmpFilesize
572KB
-
memory/364-177-0x0000000000080000-0x00000000000AD000-memory.dmpFilesize
180KB
-
memory/364-176-0x00000000007D0000-0x0000000000AD3000-memory.dmpFilesize
3.0MB
-
memory/364-175-0x0000000000180000-0x0000000000186000-memory.dmpFilesize
24KB
-
memory/364-174-0x0000000000000000-mapping.dmp
-
memory/1392-173-0x0000000006AA0000-0x0000000006C26000-memory.dmpFilesize
1.5MB
-
memory/1392-183-0x0000000009550000-0x00000000096B1000-memory.dmpFilesize
1.4MB
-
memory/1392-179-0x0000000009550000-0x00000000096B1000-memory.dmpFilesize
1.4MB
-
memory/1736-103-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-95-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-66-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-69-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-70-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-72-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-76-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-77-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-80-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-85-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-84-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-83-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-82-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-81-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-79-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-78-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-75-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-74-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-73-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-71-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-68-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-86-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-93-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-97-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-99-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-98-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-100-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-102-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-54-0x0000000075A81000-0x0000000075A83000-memory.dmpFilesize
8KB
-
memory/1736-105-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-104-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-101-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-96-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-67-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-94-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-92-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-91-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-90-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-89-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-88-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-87-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-106-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-107-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-108-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-56-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-112-0x0000000050410000-0x000000005043F000-memory.dmpFilesize
188KB
-
memory/1736-57-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-116-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-117-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-118-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-119-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-120-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-58-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-59-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-60-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-61-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-65-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-64-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-63-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1736-62-0x0000000001F60000-0x0000000001FC1000-memory.dmpFilesize
388KB
-
memory/1752-172-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/1752-171-0x0000000002720000-0x0000000002A23000-memory.dmpFilesize
3.0MB
-
memory/1752-169-0x0000000050410000-0x000000005043F000-memory.dmpFilesize
188KB
-
memory/1752-170-0x0000000050411000-0x000000005043F000-memory.dmpFilesize
184KB
-
memory/1752-113-0x0000000050410000-0x000000005043F000-memory.dmpFilesize
188KB
-
memory/1752-109-0x0000000000000000-mapping.dmp