Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2023 15:46
Static task
static1
Behavioral task
behavioral1
Sample
PO-230102_May 2023.exe
Resource
win7-20230220-en
General
-
Target
PO-230102_May 2023.exe
-
Size
222KB
-
MD5
41b41296821338a634d99d5b5c749ec1
-
SHA1
747470c76d47d50eaaa891edcc2f17b22b07d1c9
-
SHA256
272872a41e4e0ae720f6f61e50320720cf0313fe65d4c039334ed6c0cb7f37b0
-
SHA512
7e6e6892661051c9135ca042bc0af85dbbee366080ac326893a62666c4f54401bf1111b1c60c300f3a29b9ad26dfd71848a622215917f739d29ad882451e5ed0
-
SSDEEP
3072:d0gHHDGWvgDE4u+gCGHjEmELWQ88ffVls4:WkDBuEawAWE3Vls
Malware Config
Extracted
formbook
4.1
g3th
casemierlawncare.com
715harrison.com
laiwudj.com
jhy6id3bgsu.cfd
gewnaj.xyz
hullo.social
animejoyy.com
florenceodd.click
accountingassociatesil.com
cxuu39.shop
isabelladowns.com
checkstart.net
b2bmails.ru
wehantz.com
thejjwhyte.com
jerusalemfoundationsusa.com
newagreement19.com
findel.xyz
czanniversaryring.com
ape5n.com
historyszhuayears.com
homeseller.tips
storagerelax.com
internetsniandoing.com
erolemir.xyz
hsrnithplc.com
gundemozet.net
androidtau.com
adinf.co.uk
dgecai.cyou
csymd.com
lenaandbalazs.com
efefalive.buzz
kenyagov.info
thereallifeguild.net
affixbleach.online
dnsketoaqz.bar
primewindowsorigin.co.uk
amusangdam.xyz
halfpriceexams.com
locksmithexpressny.com
afifitravel.com
dn789slot.net
freshvoices.media
jhklk6565.site
ogdams.africa
monsters.boo
fastezsolar.com
diamond-parkplaza.com
bioup.xyz
printpig.co.uk
mocka.app
merxew.xyz
cndsmail.com
fuel-43574.com
38gaokk.com
bcrzyy.cfd
cactusreefranch.com
aidaomur.com
barangayzone6.tech
gmx-yy.com
bd0371.com
znjf.net
ecoenerone.com
fishingfound.work
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1948-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1948-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1748-71-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1748-73-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1232 set thread context of 1948 1232 PO-230102_May 2023.exe 28 PID 1948 set thread context of 1196 1948 MSBuild.exe 14 PID 1748 set thread context of 1196 1748 chkdsk.exe 14 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1948 MSBuild.exe 1948 MSBuild.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe 1748 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1948 MSBuild.exe 1948 MSBuild.exe 1948 MSBuild.exe 1748 chkdsk.exe 1748 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1232 PO-230102_May 2023.exe Token: SeDebugPrivilege 1948 MSBuild.exe Token: SeDebugPrivilege 1748 chkdsk.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1948 1232 PO-230102_May 2023.exe 28 PID 1232 wrote to memory of 1948 1232 PO-230102_May 2023.exe 28 PID 1232 wrote to memory of 1948 1232 PO-230102_May 2023.exe 28 PID 1232 wrote to memory of 1948 1232 PO-230102_May 2023.exe 28 PID 1232 wrote to memory of 1948 1232 PO-230102_May 2023.exe 28 PID 1232 wrote to memory of 1948 1232 PO-230102_May 2023.exe 28 PID 1232 wrote to memory of 1948 1232 PO-230102_May 2023.exe 28 PID 1196 wrote to memory of 1748 1196 Explorer.EXE 29 PID 1196 wrote to memory of 1748 1196 Explorer.EXE 29 PID 1196 wrote to memory of 1748 1196 Explorer.EXE 29 PID 1196 wrote to memory of 1748 1196 Explorer.EXE 29 PID 1748 wrote to memory of 1856 1748 chkdsk.exe 30 PID 1748 wrote to memory of 1856 1748 chkdsk.exe 30 PID 1748 wrote to memory of 1856 1748 chkdsk.exe 30 PID 1748 wrote to memory of 1856 1748 chkdsk.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\PO-230102_May 2023.exe"C:\Users\Admin\AppData\Local\Temp\PO-230102_May 2023.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1856
-
-