Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
1.0MB
-
MD5
17bbc32ae7b7b8282df2908c19e7af86
-
SHA1
20fedf92f7e8c031a197bf735ff6fced3d8e96a1
-
SHA256
0e1d21f60b2306337010b1d717e236067de9c46bd2c4b9f7c38e011af7b46093
-
SHA512
65ce67671dff258200d21b351915a9a69f4eb64b35fa1bd16549cab6bf0ad9eb7f9b7c6a87c0b7c103afe10c0069a9ab431d1bcedca5d7e7bde82dfd394ab614
-
SSDEEP
12288:wT7PqP2iNcvaHfNSiJoAdC9Kpki86TPKBt+kY4sDTwKOZLeGu:dP1Ls/Umi86TPKBK4sDTgX
Malware Config
Extracted
formbook
4.1
ey84
agencecapture.com
ky4149.com
thetherapypractice.asia
serviciosemi.com
tprhddxvn.buzz
prompttransport.net
tuv39.site
swd3.com
arti.fun
9kriketnp.com
prozoriy.fun
locphatapl.com
impactxp-dashboard.live
sponsoredoffers.com
buy-used-cars-sa.store
crown.football
jaeralintel.com
rapidguides.online
creaminthecoffee.com
makkaa.online
louiss-azdrick.xyz
kaufen-sie-einen-laptop.online
draingridmedeiros.com
go177.xyz
389256.xyz
studenthero.site
dressyshare.tokyo
astarnetapp.shop
sytrop.xyz
kitzfloor.tirol
ky8354.com
brasilcarabinas.shop
garinkbulet.space
windsorhomelife.com
gtbexchange.net
abcnews-company.space
secqin.top
oda.one
heytom.store
messiasbenmaria.com
brownbears.store
gpooldesign.com
chuck-france.net
carmelartonmaingallery.com
tron268.one
85096.top
buythebestforyou.online
sinanyalcinkaya.xyz
gwotgi.top
modiastore.com
rotus.top
petsmart.site
irpsolar.com
beyouniforms.com
windmill-group.com
galnaftagaz.com
flyupi.com
jihlavan.store
yayang.net
rodneyantoinecrayton.com
postoaklasvegas.com
shuveriophoowyltylu.bar
meetcarl.info
pkdvinhomesmiennam.com
snrprintz.net
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/1108-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1108-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1108-148-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3080-150-0x0000000000E80000-0x0000000000EAF000-memory.dmp formbook behavioral2/memory/3080-155-0x0000000000E80000-0x0000000000EAF000-memory.dmp formbook -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EA8D5EEC-8DF9-48DF-BF33-C8DE25DFF0D6}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{ED7F3CD5-5AE9-4FEF-8A76-93590029C3B2}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3012 set thread context of 1108 3012 tmp.exe 94 PID 1108 set thread context of 3004 1108 tmp.exe 20 PID 1108 set thread context of 3004 1108 tmp.exe 20 PID 3080 set thread context of 3004 3080 ipconfig.exe 20 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3080 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1108 tmp.exe 1108 tmp.exe 1108 tmp.exe 1108 tmp.exe 1108 tmp.exe 1108 tmp.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe 3080 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1108 tmp.exe 1108 tmp.exe 1108 tmp.exe 1108 tmp.exe 3080 ipconfig.exe 3080 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1108 tmp.exe Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeDebugPrivilege 3080 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1108 3012 tmp.exe 94 PID 3012 wrote to memory of 1108 3012 tmp.exe 94 PID 3012 wrote to memory of 1108 3012 tmp.exe 94 PID 3012 wrote to memory of 1108 3012 tmp.exe 94 PID 3012 wrote to memory of 1108 3012 tmp.exe 94 PID 3012 wrote to memory of 1108 3012 tmp.exe 94 PID 3004 wrote to memory of 3080 3004 Explorer.EXE 105 PID 3004 wrote to memory of 3080 3004 Explorer.EXE 105 PID 3004 wrote to memory of 3080 3004 Explorer.EXE 105 PID 3080 wrote to memory of 4596 3080 ipconfig.exe 106 PID 3080 wrote to memory of 4596 3080 ipconfig.exe 106 PID 3080 wrote to memory of 4596 3080 ipconfig.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3320
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3848
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1360
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:5088
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4392
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1564
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1152
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2228
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1880
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:4596
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4932