Analysis
-
max time kernel
61s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-12-2020 21:29
Static task
static1
Behavioral task
behavioral1
Sample
b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe
Resource
win10v20201028
General
-
Target
b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe
-
Size
980KB
-
MD5
9d14ac0e8c2fc7742a10a92d44c120d4
-
SHA1
ef6dc297e8016e3ffea966172d6d36e19e32a8bd
-
SHA256
b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766
-
SHA512
678ff0956a0465729a84a582747147e3b774ef680cf85880f9ac218435ac5e83b68ef424ad17db9309b7eedba20c8ef2c445e584923f229405f9a014e3f76eac
Malware Config
Extracted
formbook
http://www.handanzhize.info/d5/
dsmtpf.com
korianfondation.net
eporums.com
xqnmc.com
familybusinesslawyer.net
0pe484.com
poshaesthetics.com
thaomocbamien.com
nanogoldcoin.net
uenkai.com
i58.ltd
izqnlf.men
puresunfarms.net
shebeihuishou.net
larryoldffashioned.win
salutewritersrepublic.com
astrologuecabinetconseilmc.com
takeourtips.com
pat473.com
bloq.solar
talleramberes.com
fjmyrs.com
netnug.com
athleticgolffitness.com
butterflydreamshop.com
icwcn.com
3w8x.com
cargambia.com
xn--fiqw6hvyeltc829ebua050k.com
oceansidealano.com
pcbews.online
payoneer-support.com
nsqre.net
englishcity1.com
vintageoats.com
wwwswty5588.com
1r4fourwell.men
wy284.com
gzbafw.com
hariladapparenvironment.com
cb7palmas.com
bizdeductor.com
blackkiwipublishing.com
agentsecu.com
thepushguide.com
nickgeremia.com
5725n-brook.com
stay-at-home-mom.online
shimoigi.net
krookedhouse.com
markeactive.net
etudesnumero.com
arielps.com
itagent.info
toledocarclinic.com
gumomu.com
www560234.com
nakecirijosoha.com
perfectformoms.com
boonenzo.com
rtknf.com
kokor-o.com
resunssspchub.online
framstegs-akademin.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1388-4-0x0000000000000000-mapping.dmp formbook -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exepid process 1388 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exepid process 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exedescription pid process target process PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe PID 776 wrote to memory of 1388 776 b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe"C:\Users\Admin\AppData\Local\Temp\b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe"C:\Users\Admin\AppData\Local\Temp\b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1388-4-0x0000000000000000-mapping.dmp