Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
PIO298767890098.exe
Resource
win7-20220812-en
General
-
Target
PIO298767890098.exe
-
Size
613KB
-
MD5
18a53e8426076b426f4ea1af0ebebc4f
-
SHA1
b2ccd7190c03583d41e4b9f74e0fcc9c3b72d20e
-
SHA256
3c35a04edd86465c4f752711854c9bc1a902395c647067b5e88c53895654906f
-
SHA512
77b23336b822cd6680f78f6f7a704c674ae71d239d8f358a7bbdd7668ec6c9cb1a03e49b612d696da453f978e8423c81dd58f4ba71ff39a082dd3ad9b949a86f
-
SSDEEP
12288:qLmHM28bxhvruH5XuwSl595n5HTFhiUxpBGefqwKZcFROidcea:hExhTcRSXn5HJ+eyFcFy
Malware Config
Extracted
formbook
4.1
g47e
73346.top
matureshift.shop
bohnergroup.com
snehq.store
7pijj.com
wineshopsonline.com
reactivecreditagric.mom
aganderson.net
1800302.vip
942565.com
phonetography.club
garansugar.com
pinetree.email
34245.top
thejoy.run
pointvirtualrx.com
pqz.info
paddleboards.shop
vvapro.info
8peakssustainablelab.com
andareshoes.com
theblockdatasystem.com
torazemi.com
icloudlost.info
tentukan-t4rlftransfer.xyz
easytosuccess.com
kirkzero318.top
lkareea.site
decentralizedponzi.com
58worchester.info
portalmet.com
soul-church.net
work-service.monster
warungslots.com
onlynewslook.info
rfrcomunicate.com
shadyoakministries.com
jamesporcelain.store
reviewmgmtsystem.com
stnicholaswtc.store
flayos.xyz
kfcvn3.tech
swashbuckler-garron.info
capegrimwater.store
cheyanderson.com
jimsnell.xyz
vjonir.online
timelapsefx.com
klixyo.com
jeux.stream
zenmessageip.monster
olaf-droste-products.net
jsonlu.xyz
alfakhamahusa.net
makeeverywheresafer.com
longergolf.com
mscechbgdansk.com
nurse-note.net
uqyvtje.top
ky9940.com
buthyggg.com
laesperanzarealista.com
casasdosbinos.site
nobullpc.com
prequelgenetics.com
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/1348-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1348-63-0x000000000041F0E0-mapping.dmp formbook behavioral1/memory/1348-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1348-73-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/924-77-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/924-80-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 612 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1100 set thread context of 1348 1100 PIO298767890098.exe 28 PID 1348 set thread context of 1256 1348 PIO298767890098.exe 14 PID 1348 set thread context of 1256 1348 PIO298767890098.exe 14 PID 924 set thread context of 1256 924 wininit.exe 14 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1100 PIO298767890098.exe 1348 PIO298767890098.exe 1348 PIO298767890098.exe 1348 PIO298767890098.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe 924 wininit.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1348 PIO298767890098.exe 1348 PIO298767890098.exe 1348 PIO298767890098.exe 1348 PIO298767890098.exe 924 wininit.exe 924 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1100 PIO298767890098.exe Token: SeDebugPrivilege 1348 PIO298767890098.exe Token: SeDebugPrivilege 924 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1100 PIO298767890098.exe 1100 PIO298767890098.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1348 1100 PIO298767890098.exe 28 PID 1100 wrote to memory of 1348 1100 PIO298767890098.exe 28 PID 1100 wrote to memory of 1348 1100 PIO298767890098.exe 28 PID 1100 wrote to memory of 1348 1100 PIO298767890098.exe 28 PID 1100 wrote to memory of 1348 1100 PIO298767890098.exe 28 PID 1100 wrote to memory of 1348 1100 PIO298767890098.exe 28 PID 1100 wrote to memory of 1348 1100 PIO298767890098.exe 28 PID 1256 wrote to memory of 924 1256 Explorer.EXE 29 PID 1256 wrote to memory of 924 1256 Explorer.EXE 29 PID 1256 wrote to memory of 924 1256 Explorer.EXE 29 PID 1256 wrote to memory of 924 1256 Explorer.EXE 29 PID 924 wrote to memory of 612 924 wininit.exe 30 PID 924 wrote to memory of 612 924 wininit.exe 30 PID 924 wrote to memory of 612 924 wininit.exe 30 PID 924 wrote to memory of 612 924 wininit.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\PIO298767890098.exe"C:\Users\Admin\AppData\Local\Temp\PIO298767890098.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\PIO298767890098.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PIO298767890098.exe"3⤵
- Deletes itself
PID:612
-
-