Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2023, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
THREE quotations.exe
Resource
win7-20230220-en
General
-
Target
THREE quotations.exe
-
Size
766KB
-
MD5
ae2f78ed3b32a4e7f969ce267778ac66
-
SHA1
3b7c6425c65933d6b5dac6187e16a0597f3ea5aa
-
SHA256
d5e9981b7fdef80983edcdda6b3e09870fe991720db4684986ceecb01d24506c
-
SHA512
f21cf08412c3c53248e7535aa37430f314a6d8e900cc14e908bab730d1c1db555bb8875c9acca9940b1cb5ef6a7d1fdd58ee6abd9b6fe91bd4722d6037e5630e
-
SSDEEP
12288:0uJas/16/YHmM9mARLAV+/3M73epjTDrFljb3m0z9SFOuDsDtnQkCEgYDjz:0Bs6cV9mA9Im873epjyOxDtQXEnDf
Malware Config
Extracted
formbook
4.1
ct45
aeepi.com
lifestyledoneright.com
dilojakac.cfd
vievnsfabula.xyz
jiggirirecords.com
sklaap.xyz
prepper.day
tahta4d-vip.info
p94d3.xyz
17819.vip
gptvoucher.com
ig2x0m.com
croppdtt.com
hnnhiuqme6e701.xyz
zeis.xyz
w77773.com
inspantringa.cfd
webnative.xyz
haahhuzns1okd1.xyz
thinkingmansguidetowomen.com
w-coding-bootcamp-9131.online
ikano-dashboard.com
celikhazne.shop
admiringcoaching.com
elzanatyautoparts.com
e12123t14.xyz
weifengjuyuan.com
canallamar.online
623852.xn--mk1bu44c
techroble.com
yhs7.com
auctionufaslots.com
islamaswaja.com
etykewpe.cfd
vwamio.xyz
financejon.tech
06gp.icu
bn-todaybsvurumayisayi.net
michiganbricktemp.com
ziviupadnu.cfd
92227y9.com
getmagesty.com
prodmanoaudio.com
livy663.xyz
theinvoicing.com
banadacigkofte.online
thienanhotel-hue.com
zfxny117.com
mindsurfservers.com
osnovaforall.com
visizzle.com
vegiwa.online
nasaelephantplant.space
porastodzywa.xyz
compratecno.com
parkcitycollege.com
griesszetels.cfd
worthymutate.xyz
asimpledate.monster
ranthamborechambalsafari.com
hoorayworld.com
edmarkar.com
escoladabelezaonline.site
zb3j3dfz.cyou
toddlerworldacademy.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3528-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3528-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3888-150-0x0000000000490000-0x00000000004BF000-memory.dmp formbook behavioral2/memory/3888-152-0x0000000000490000-0x00000000004BF000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1624 set thread context of 3528 1624 THREE quotations.exe 89 PID 3528 set thread context of 2680 3528 vbc.exe 55 PID 3888 set thread context of 2680 3888 explorer.exe 55 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3528 vbc.exe 3528 vbc.exe 3528 vbc.exe 3528 vbc.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3528 vbc.exe 3528 vbc.exe 3528 vbc.exe 3888 explorer.exe 3888 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3528 vbc.exe Token: SeDebugPrivilege 3888 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3528 1624 THREE quotations.exe 89 PID 1624 wrote to memory of 3528 1624 THREE quotations.exe 89 PID 1624 wrote to memory of 3528 1624 THREE quotations.exe 89 PID 1624 wrote to memory of 3528 1624 THREE quotations.exe 89 PID 1624 wrote to memory of 3528 1624 THREE quotations.exe 89 PID 1624 wrote to memory of 3528 1624 THREE quotations.exe 89 PID 2680 wrote to memory of 3888 2680 Explorer.EXE 90 PID 2680 wrote to memory of 3888 2680 Explorer.EXE 90 PID 2680 wrote to memory of 3888 2680 Explorer.EXE 90 PID 3888 wrote to memory of 4712 3888 explorer.exe 91 PID 3888 wrote to memory of 4712 3888 explorer.exe 91 PID 3888 wrote to memory of 4712 3888 explorer.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\THREE quotations.exe"C:\Users\Admin\AppData\Local\Temp\THREE quotations.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:4712
-
-