Analysis
-
max time kernel
38s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 06:44
Static task
static1
Behavioral task
behavioral1
Sample
ab830be5e48f1db0f4ebf3a106473a32.exe
Resource
win7v20201028
General
-
Target
ab830be5e48f1db0f4ebf3a106473a32.exe
-
Size
685KB
-
MD5
ab830be5e48f1db0f4ebf3a106473a32
-
SHA1
3a376a9ad849b778b4ef2235616068f221b2e61e
-
SHA256
814c8a7ae9ec48b7a455cdf15b8c520fc9d7695e24f31afd5ff72cbc25e08704
-
SHA512
45f5423da5942a549eabfa948c01adadcc2b8cd2d1971936b23d5d230af26986b7fb6e833d68f54ea967f902fec4eacb7a7e6efa37961910c62333ca6ffa17c6
Malware Config
Extracted
formbook
http://www.waverunner-fan.com/pp2/
meredithridenhour.com
foundationsseniormanagement.com
sallyta.com
msmonlinellc.com
entreprisesfr.com
neadclunlounge.com
lexuscarbonfiber.com
electroglas-probers.com
investedgefinancialinc.com
blm.healthcare
workoutmagazinemx.com
edmondsagent.com
rodrigzart.com
standardstripcurtains.com
carrier.email
hifan.info
fhcqtravel.com
legacycream.com
topfurnity.com
solids-development.net
e-reklamcim.com
cookedabs.com
ecotime.info
rosalesingenieria.com
onehundredphotographs.com
brightwoodcollection.com
kafamrahat.pro
moveagronegocios.com
voltchargers.net
rgsjanitorial.com
oroinplastic.com
papelonlavapies.com
jayfloe.com
hotlinefx.com
anitrap.com
nehyam.com
vistas-del-valle.com
liliaandjohn.com
thelifehereafter.com
homepublishingonline.com
moneo-umu.com
99blogs.club
mauricemeade.com
55967w.com
yhel-official.com
auykypzna.club
theindiatrends.com
legnoartshopusa.com
dkbaits.com
fairandfitness.store
rakkutenn.icu
teamamlinhomevalue.com
stayweirdswim.uk
businesscouuntmanagement.com
zunebox.com
paracubaexpress.com
legantstylz.net
locomarket-kwt.com
kal-shop.com
guoyuan.plus
kocaeliguvercin.com
silverrosefd.co.uk
kunstatelier.net
gomoolah.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1660-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1660-8-0x000000000041EBE0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ab830be5e48f1db0f4ebf3a106473a32.exedescription pid process target process PID 648 set thread context of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ab830be5e48f1db0f4ebf3a106473a32.exepid process 1660 ab830be5e48f1db0f4ebf3a106473a32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ab830be5e48f1db0f4ebf3a106473a32.exedescription pid process target process PID 648 wrote to memory of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe PID 648 wrote to memory of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe PID 648 wrote to memory of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe PID 648 wrote to memory of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe PID 648 wrote to memory of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe PID 648 wrote to memory of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe PID 648 wrote to memory of 1660 648 ab830be5e48f1db0f4ebf3a106473a32.exe ab830be5e48f1db0f4ebf3a106473a32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab830be5e48f1db0f4ebf3a106473a32.exe"C:\Users\Admin\AppData\Local\Temp\ab830be5e48f1db0f4ebf3a106473a32.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ab830be5e48f1db0f4ebf3a106473a32.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/648-2-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/648-3-0x0000000000800000-0x0000000000801000-memory.dmpFilesize
4KB
-
memory/648-5-0x0000000000360000-0x000000000036E000-memory.dmpFilesize
56KB
-
memory/648-6-0x0000000005270000-0x0000000005305000-memory.dmpFilesize
596KB
-
memory/1660-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1660-8-0x000000000041EBE0-mapping.dmp