Analysis
-
max time kernel
38s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-12-2020 05:21
Static task
static1
Behavioral task
behavioral1
Sample
41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe
Resource
win7v20201028
General
-
Target
41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe
-
Size
300KB
-
MD5
fd8cd7d2e66f83b52c4a5f23e8eb5c40
-
SHA1
ba16c9148e6ee8e70962eb60d629a28902befe74
-
SHA256
41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b
-
SHA512
6ef5c4aa2b9cdc80089ab8f188e9744aa65c27dd539bb1c2c55e89b24e9f17d29c8b4fad803ac444ce3300aa547fc93c8aa42155a038ebc64caeb84f1a0f4b14
Malware Config
Extracted
formbook
http://www.joomlas123.com/m92q/
marychrisantonettenina.com
orozcosantillanabogados.com
nikeairmax-shop.com
sugarride.com
bobevanseggs.com
everyremedy.com
taascoin.com
curve-arch.com
seowebdirectory.biz
airplanes.international
hrzwum.info
sjqaf.com
mjhcommunications.com
kobigrinberg.com
hhh573.com
elite-titleagency.com
onitsukasally.info
onosouvenir.com
tianyezhushu.com
taizhoutongyuan.com
thebalancedworkmom.com
prudera.com
180degreeturnfoundation.net
chincualmates.com
biopplies.net
camellia-hotels.com
pmfootball.com
jnsrxjx.net
salmonrunfishinglodge.com
carbontouchsensecloud.com
urbanotrends.com
cover-necessary.com
shore-photos.com
rapidraings.com
sproutedaustralia.com
superscienceclub.com
ourfinesthourspeak.life
fd6199.com
keirow-takasaki.com
scila.solutions
jlszcqc.com
dezimegraphics.com
xn--vk1by6x7wek9k8wf.com
foolsgoldicecream.com
md21takayama.com
iumspeech.com
isaivu.com
acuratedspace.com
hainefete.com
metal-stampingparts.com
nnxhjx.com
taxienibiza.com
ejkeepsakes.com
happyroom8.com
wx-yjz.com
vvvvv.ink
hhctv.info
sprengstoffspuerhunde24.com
xn--9et693e.net
rupiahqq.win
gxhjsw.com
con-solvenz.com
wyvernbusinesssystems.net
hochzeitsmarketing.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1660-8-0x000000000041E320-mapping.dmp formbook behavioral1/memory/1660-7-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Processes:
resource yara_rule behavioral1/memory/1836-6-0x00000000005B0000-0x00000000005E4000-memory.dmp rezer0 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exedescription pid process target process PID 1836 set thread context of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exepid process 1660 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exedescription pid process target process PID 1836 wrote to memory of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe PID 1836 wrote to memory of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe PID 1836 wrote to memory of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe PID 1836 wrote to memory of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe PID 1836 wrote to memory of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe PID 1836 wrote to memory of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe PID 1836 wrote to memory of 1660 1836 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe 41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe"C:\Users\Admin\AppData\Local\Temp\41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\41e1b66a7d9ba85d2edb67eb3adf1ba8dd251ded73925d82f98bfdda5b34511b.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1660-8-0x000000000041E320-mapping.dmp
-
memory/1660-7-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1836-2-0x00000000749E0000-0x00000000750CE000-memory.dmpFilesize
6.9MB
-
memory/1836-3-0x0000000000A50000-0x0000000000A51000-memory.dmpFilesize
4KB
-
memory/1836-5-0x0000000000300000-0x000000000030B000-memory.dmpFilesize
44KB
-
memory/1836-6-0x00000000005B0000-0x00000000005E4000-memory.dmpFilesize
208KB