Analysis
-
max time kernel
11s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 06:31
Static task
static1
Behavioral task
behavioral1
Sample
06aafd2382d63afc9874125e5c1062b0.exe
Resource
win7v20201028
General
-
Target
06aafd2382d63afc9874125e5c1062b0.exe
-
Size
326KB
-
MD5
06aafd2382d63afc9874125e5c1062b0
-
SHA1
e3b553368eec14ea84ba32f291a17dc614c64670
-
SHA256
92420ebd5feeb4171db8a4877ac6eb2dd594fd4d07192408b26aa9b98c5d048d
-
SHA512
cd317df3b6f9b86e3b3c2eef38d5b4fb8900562aae920c08607075fe6fd3e01480035f6ffb4188cae49c37faebd6ed626a2da457c75d99ba1535a42d2a690b27
Malware Config
Extracted
formbook
http://www.evana-rohanihijab.com/iic6/
capableandresilient.com
listaprzygod.com
cashhomeprogram.com
aboutwheelchair.com
clk4milli.club
asakitreks.com
liquiddreamworld.com
uqur88.com
bestifystore.com
arancionehq.xyz
mmoimperium.com
houxinjian.com
satmonitoring.com
tidalhaven.com
blcdevelopers.com
piratesofthefun.com
kadopulsa.com
xn--o39au6k0nm4rghsaq0c.net
wxxxtw.com
kyrtjf.com
rapid-rewards.club
powerschoolnocca.com
naturalorganizing.com
auzura.net
royalcopystar.com
crowdcork.com
xtrememasksanitizer.com
sia-38.com
forthathletics.com
nissy-fore.com
ofertaze.com
gammachi1925.xyz
escortslove.com
naiyou-navi.com
visiontoinvest.com
thatlifeclothingco.com
eucmia.info
alamaula.sucks
tidalgin.com
netleyholdings.space
mascofarms.com
xn--teakdck-9wa.net
powerlotusengineering.com
wearsd.com
postdatabits.com
bossabars.net
myivynest.com
newcovburgawnc.com
goldyslotvip.com
jxappc.com
gabrielrasskin.com
nakshatrabeachresort.com
reigninglegacy.net
ghelyoun.net
obgynpatientnews.com
cafebabe.net
enuyu.net
best4ufoods.com
institutodederechoygobierno.com
areralind.com
open-osrs.net
mixtaks.life
qtmeters.com
haxb33.xyz
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3520-2-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3520-3-0x000000000041ED60-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
06aafd2382d63afc9874125e5c1062b0.exedescription pid process target process PID 640 set thread context of 3520 640 06aafd2382d63afc9874125e5c1062b0.exe 06aafd2382d63afc9874125e5c1062b0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
06aafd2382d63afc9874125e5c1062b0.exepid process 3520 06aafd2382d63afc9874125e5c1062b0.exe 3520 06aafd2382d63afc9874125e5c1062b0.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
06aafd2382d63afc9874125e5c1062b0.exepid process 640 06aafd2382d63afc9874125e5c1062b0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
06aafd2382d63afc9874125e5c1062b0.exedescription pid process target process PID 640 wrote to memory of 3520 640 06aafd2382d63afc9874125e5c1062b0.exe 06aafd2382d63afc9874125e5c1062b0.exe PID 640 wrote to memory of 3520 640 06aafd2382d63afc9874125e5c1062b0.exe 06aafd2382d63afc9874125e5c1062b0.exe PID 640 wrote to memory of 3520 640 06aafd2382d63afc9874125e5c1062b0.exe 06aafd2382d63afc9874125e5c1062b0.exe PID 640 wrote to memory of 3520 640 06aafd2382d63afc9874125e5c1062b0.exe 06aafd2382d63afc9874125e5c1062b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06aafd2382d63afc9874125e5c1062b0.exe"C:\Users\Admin\AppData\Local\Temp\06aafd2382d63afc9874125e5c1062b0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\06aafd2382d63afc9874125e5c1062b0.exe"C:\Users\Admin\AppData\Local\Temp\06aafd2382d63afc9874125e5c1062b0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses