Analysis
-
max time kernel
57s -
max time network
56s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 07:14
Static task
static1
Behavioral task
behavioral1
Sample
6b0128e753b4c8eb55a0726dbdbbf35e.exe
Resource
win7v20201028
General
-
Target
6b0128e753b4c8eb55a0726dbdbbf35e.exe
-
Size
1.0MB
-
MD5
6b0128e753b4c8eb55a0726dbdbbf35e
-
SHA1
12ab2a6cb7c26acad4ba209bafdb6fd2ff33523b
-
SHA256
0ae22d4877231b64b2e9e1252bbe8636ea43fe5692ca899733e715ccfc82e224
-
SHA512
152e90baebb510c397a7625ec9295ea806d4c233b00df8a938c9f62ea5966f88873b26558cb03131ba992ce7713704b2f2aeb90394bf46355eb6f16d119932f7
Malware Config
Extracted
formbook
http://www.zglvyouzaixian.com/nki/
igo-digiworld.com
infrahiit.com
herhealingwater.com
inspiredbytradition.com
onlinepropertyworld.com
rvwdj.com
mudahbikinsuhi.online
multipleofferonline.com
striveyouthministry.com
affectiveneuro.net
f21m.com
perfumefashion.icu
instantcash4rvs.com
help-verifiedbadge.com
solomonislandsblog.com
vipshoppingwizard.com
doggybargains.com
fjyaoxi.net
luxpropertyandassociates.com
companyfinders.com
alifeflooring.com
watermeloncrypto.com
internationalaid.global
petrosu.net
fireyourschool.com
gofawerunebe.com
lazystorage.com
tgasstore.com
adoniskitchenbath.com
it4cracks.com
revsharez.com
radioroutiers.com
szalun.com
theacademylife.com
jackcdoherty.com
theselfcaremenu.com
arentist.com
skyfun.asia
kroumoda.com
brodskikonetejneri.com
citestmansoon3445.com
laalianza.net
lwfenterprises.com
changeledger.com
x-box2send15.club
postraducion.xyz
kpybevx.icu
lolamind.com
jaipurethnic.com
candixenergy.com
degreespoint.com
311tac.com
donationwheel.com
ps3e.com
hyderabadcycles.com
nehyam.com
eversouthhangzhou.com
modaemira.com
k2bsi.com
jiopan.com
wheelerfamilyhistory.net
htaxbiz.com
somethinggotmestarted.com
aprilsbookkeeping.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1624-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1624-8-0x000000000041EB70-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6b0128e753b4c8eb55a0726dbdbbf35e.exedescription pid process target process PID 1676 set thread context of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
6b0128e753b4c8eb55a0726dbdbbf35e.exe6b0128e753b4c8eb55a0726dbdbbf35e.exepid process 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 1624 6b0128e753b4c8eb55a0726dbdbbf35e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6b0128e753b4c8eb55a0726dbdbbf35e.exedescription pid process Token: SeDebugPrivilege 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
6b0128e753b4c8eb55a0726dbdbbf35e.exedescription pid process target process PID 1676 wrote to memory of 1664 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1664 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1664 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1664 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1604 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1604 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1604 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1604 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe PID 1676 wrote to memory of 1624 1676 6b0128e753b4c8eb55a0726dbdbbf35e.exe 6b0128e753b4c8eb55a0726dbdbbf35e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b0128e753b4c8eb55a0726dbdbbf35e.exe"C:\Users\Admin\AppData\Local\Temp\6b0128e753b4c8eb55a0726dbdbbf35e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\6b0128e753b4c8eb55a0726dbdbbf35e.exe"{path}"2⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\6b0128e753b4c8eb55a0726dbdbbf35e.exe"{path}"2⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\6b0128e753b4c8eb55a0726dbdbbf35e.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-