Analysis
-
max time kernel
57s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 08:49
Static task
static1
Behavioral task
behavioral1
Sample
8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe
Resource
win7v20201028
General
-
Target
8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe
-
Size
1.0MB
-
MD5
232a964f2335bd594cc991d75b5794e1
-
SHA1
40b0c49f9cb93c9537662c948efe09ee1293491e
-
SHA256
8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2
-
SHA512
8583a71e22bbc5cf0ed61358d7237d14bac712ab5e281854717a3fcfec7388d214d9fca564455f1efa3934956d6af4c5a27391ccb9c312dc95b38f56361b012b
Malware Config
Extracted
formbook
http://www.paniciagency.com/n6sn/
siearrasmission.com
exploringcharlotte.com
michaelthomasgunn.com
automationmarketers.com
vynxcl3kv3.com
df2229.com
vazivaimmo.net
usful.info
vescuderoabogados.com
janidevco.com
newshum.com
teamworkgod.com
snowwayconstruction.com
s8fyit.com
economicidentity.com
jennysay.com
gamoauction.com
thebooksofblood.com
graymatter-bi.com
newtownquick.net
howtoopenabeerwith.com
titimo.com
triangleurope.com
kayleecorner.com
aloveforbooks.com
pausmam.com
soldbylydia.com
unangelo.online
crohix.com
biezonskyrealty.net
nasmgmt.com
customersforlifeworkshop.com
mobilecomputerreps.com
rorricsafaris.com
3937899.com
driftcoin.com
vict.pro
allseasonsroofingsiding.net
finelinecare.com
consultantsapp.com
rangers3.xyz
les-bocaux.com
sou1.net
toddsmenswear.com
neptuneresto.com
barrierbeat.com
kordantravel.com
letterstogeorgie.com
brcond.com
slowcourt.com
shopsituyenphuongxuan.com
surwitlife.com
bklovecoach.com
albertafreeman.com
takingcarababiea.com
cnhremandealerservice.com
specializednurse.com
mymelodiousworld.com
kboom.fan
wildalaskacodcompany.com
temperpoint.com
coingrave.com
hosefire.com
heyimlulu.xyz
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1548-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1548-15-0x000000000041ED20-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exedescription pid process target process PID 3284 set thread context of 1548 3284 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exepid process 1548 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 1548 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exedescription pid process target process PID 3284 wrote to memory of 1548 3284 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe PID 3284 wrote to memory of 1548 3284 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe PID 3284 wrote to memory of 1548 3284 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe PID 3284 wrote to memory of 1548 3284 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe PID 3284 wrote to memory of 1548 3284 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe PID 3284 wrote to memory of 1548 3284 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe 8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe"C:\Users\Admin\AppData\Local\Temp\8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe"C:\Users\Admin\AppData\Local\Temp\8ea59257ca1ccc0d6680d184a985dff22180e056aec54b3afd3ed2c3ad3bc4d2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548