Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 14:33
Static task
static1
Behavioral task
behavioral1
Sample
4310b5640ee8ea88007a978540a32129.exe
Resource
win7v20201028
General
-
Target
4310b5640ee8ea88007a978540a32129.exe
-
Size
1.4MB
-
MD5
4310b5640ee8ea88007a978540a32129
-
SHA1
35f274fd4675267afb9c29c38896cc7ea9f10e34
-
SHA256
d4dc8610837799abecadc4d3db1f6a8cbbce340de07b90e9868603f50c7fe762
-
SHA512
eeddf53ea3a22ca9e4fc6ee8cf451a3cc70ffb58026ef3b97bf13fb1b101f0b603bf7987bd84873f467ab0f976af95b77170a78abbde410dc44a3fdb727d485d
Malware Config
Extracted
formbook
http://www.thedilleyo.com/kb8/
goodsforbuilders.com
dafuhe.com
parapharmacity.com
montclairymcamotionvibe.com
jamesmccloudart.com
reignfallentertainment.com
couplesforequality.com
pitchbop.com
minipresspaperco.com
venoam.com
so-paradise.com
surgeryprovider.com
donaldscareers.com
disney-funlife.com
biosolo.net
themodsmith.net
grandhawaiian.com
11mountains.com
immatesearch.com
stochastichq.com
buroyellow.com
blackpopsatl.com
trivietdesign.com
freedomauthor.com
barinvestmentgroup.com
atlantisbeautym.com
compresedairsystems.com
negociobrilhante.com
glenviewpulse.com
charterforengagement.com
athelon.academy
1000-help19.club
startebgine.com
kestega.com
bowieliving.com
ecotechprime.com
thenewwayofliving.com
celerindustrial.com
uniqueama.com
gedankenspiel-coaching.com
informed-citizenry.com
xn--fiqvr53rcnhev5b7vo.com
ericnewburyparkhomes.com
cmdp0o7mi0-e.info
weavrfish.com
freisaq.com
assuredoutcomesllc.com
findingmytao.com
br9898.com
tinyschoolstyle.com
bavarian-luxury.com
over50legalplan.com
bartimeu.com
land-fair.com
archeologique.com
wedesignonline.net
anna-mueller.design
spielkorb.com
nwflworkcomp.com
abyafashion.com
allrenovationcompany.com
hayalspel.com
2664senter264.com
jgmerino.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1396-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1396-14-0x000000000041EB70-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4310b5640ee8ea88007a978540a32129.exedescription pid process target process PID 1308 set thread context of 1396 1308 4310b5640ee8ea88007a978540a32129.exe 4310b5640ee8ea88007a978540a32129.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
4310b5640ee8ea88007a978540a32129.exe4310b5640ee8ea88007a978540a32129.exepid process 1308 4310b5640ee8ea88007a978540a32129.exe 1308 4310b5640ee8ea88007a978540a32129.exe 1308 4310b5640ee8ea88007a978540a32129.exe 1396 4310b5640ee8ea88007a978540a32129.exe 1396 4310b5640ee8ea88007a978540a32129.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4310b5640ee8ea88007a978540a32129.exedescription pid process Token: SeDebugPrivilege 1308 4310b5640ee8ea88007a978540a32129.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4310b5640ee8ea88007a978540a32129.exedescription pid process target process PID 1308 wrote to memory of 1396 1308 4310b5640ee8ea88007a978540a32129.exe 4310b5640ee8ea88007a978540a32129.exe PID 1308 wrote to memory of 1396 1308 4310b5640ee8ea88007a978540a32129.exe 4310b5640ee8ea88007a978540a32129.exe PID 1308 wrote to memory of 1396 1308 4310b5640ee8ea88007a978540a32129.exe 4310b5640ee8ea88007a978540a32129.exe PID 1308 wrote to memory of 1396 1308 4310b5640ee8ea88007a978540a32129.exe 4310b5640ee8ea88007a978540a32129.exe PID 1308 wrote to memory of 1396 1308 4310b5640ee8ea88007a978540a32129.exe 4310b5640ee8ea88007a978540a32129.exe PID 1308 wrote to memory of 1396 1308 4310b5640ee8ea88007a978540a32129.exe 4310b5640ee8ea88007a978540a32129.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4310b5640ee8ea88007a978540a32129.exe"C:\Users\Admin\AppData\Local\Temp\4310b5640ee8ea88007a978540a32129.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\4310b5640ee8ea88007a978540a32129.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396