Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
ibm_Centos.exe
Resource
win7-20230621-en
General
-
Target
ibm_Centos.exe
-
Size
346KB
-
MD5
420a0137eaa22be40636008e05d8005a
-
SHA1
bc96f51d24069d9b8364121dc4397c88e08cb309
-
SHA256
210d5b19dfc3dff919ba6ed4d76d2aa8becc988dabcca66b247d05c51811434b
-
SHA512
e7f9b8380e64cdd4836fdc34efd3417812ab783d300a876693f66cddb4667480122f34ac597f5ea9948180a32cff9a6885ad97f1ea063584c00d9b6f71655796
-
SSDEEP
6144:vYa6rL0Yr8jMUoy49G6SCP/3S19UvOlJJOa85BE681q6pvojLjVY:vYZDJyDm/3SRJwvBEz7p6tY
Malware Config
Extracted
formbook
4.1
m42i
kosporttraining.com
z19zgcn.site
kaka225.click
85471xii.net
iuplqle.xyz
bengtsberg.net
bk2y0rmx.site
hotspudqec.space
dreamshospital.com
studio-glinka.com
garotosdatv1.online
au-t-global.com
0kxm.com
medsuppanam.com
sameypaige.com
osstshirts.com
xkrujqqo.shop
hk2r.top
rakebacksites.com
ledxiu.xyz
skywardcaresolutions.com
georgiapoolrepair.com
m-1025bets10.com
banco-santander.info
minnesotatootall.com
kddd.top
jiaxiangxh.com
powertech4u.com
keostrife.com
gerianna.info
zds120.net
atempre.tech
knackwoodcraft.com
xbxmzg.com
foiplusvision.com
coastalfacepaint.com
thericklowe.com
68brbn.com
cnmzsz.com
homzinsurance.com
usekalegpt77.com
kickreseme.com
wpdisk.online
dreadfullstack.com
security-cameras-uk-en.bond
passionate-lovee.info
lks-me.com
prixmalins.com
wanitabaikbaik.com
hatcherpasscombinationtours.com
acmanu-us.site
giandomenicodonatelli.com
lavagame789.win
zishiying.net
biancagift.com
aerillon.com
ndjkshdooeiowoieui.site
wsnclaw.com
vaughanautoappraisers.com
1bysh.top
011yd.com
auraduha.com
brandof9.com
papeleriaentrecolores.com
brachyurus.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2004-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2004-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2004-72-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/576-77-0x0000000000100000-0x000000000012F000-memory.dmp formbook behavioral1/memory/576-79-0x0000000000100000-0x000000000012F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 824 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 ibm_Centos.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000\Software\Microsoft\Windows\CurrentVersion\Run\pyuuennjss = "C:\\Users\\Admin\\AppData\\Roaming\\xxtdxxhqqmvvfb\\bkgg.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ibm_Centos.exe\"" ibm_Centos.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1200 set thread context of 2004 1200 ibm_Centos.exe 27 PID 2004 set thread context of 1184 2004 ibm_Centos.exe 21 PID 2004 set thread context of 1184 2004 ibm_Centos.exe 21 PID 576 set thread context of 1184 576 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2004 ibm_Centos.exe 2004 ibm_Centos.exe 2004 ibm_Centos.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe 576 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1184 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1200 ibm_Centos.exe 2004 ibm_Centos.exe 2004 ibm_Centos.exe 2004 ibm_Centos.exe 2004 ibm_Centos.exe 576 cmstp.exe 576 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2004 ibm_Centos.exe Token: SeDebugPrivilege 576 cmstp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1184 Explorer.EXE 1184 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1184 Explorer.EXE 1184 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1184 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2004 1200 ibm_Centos.exe 27 PID 1200 wrote to memory of 2004 1200 ibm_Centos.exe 27 PID 1200 wrote to memory of 2004 1200 ibm_Centos.exe 27 PID 1200 wrote to memory of 2004 1200 ibm_Centos.exe 27 PID 1200 wrote to memory of 2004 1200 ibm_Centos.exe 27 PID 1184 wrote to memory of 576 1184 Explorer.EXE 28 PID 1184 wrote to memory of 576 1184 Explorer.EXE 28 PID 1184 wrote to memory of 576 1184 Explorer.EXE 28 PID 1184 wrote to memory of 576 1184 Explorer.EXE 28 PID 1184 wrote to memory of 576 1184 Explorer.EXE 28 PID 1184 wrote to memory of 576 1184 Explorer.EXE 28 PID 1184 wrote to memory of 576 1184 Explorer.EXE 28 PID 576 wrote to memory of 824 576 cmstp.exe 29 PID 576 wrote to memory of 824 576 cmstp.exe 29 PID 576 wrote to memory of 824 576 cmstp.exe 29 PID 576 wrote to memory of 824 576 cmstp.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\ibm_Centos.exe"C:\Users\Admin\AppData\Local\Temp\ibm_Centos.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\ibm_Centos.exe"C:\Users\Admin\AppData\Local\Temp\ibm_Centos.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ibm_Centos.exe"3⤵
- Deletes itself
PID:824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD54874e9c95597c552811c664d489739c0
SHA1109145d468e60a9c1d3b9dbfffbf798bfa4e8e95
SHA25639cd81d25e703846eb67234b19357736b57f2f4a0f1c4b802f9d0db2c99b3456
SHA5128add133201607289460f20d74e05a93f49fe54cd3eae6cf11195340ba01354df6275461cb7f5e00b9203e237da3bae3a5ebd89d77030e36b95bd9f3022a99cec