Analysis
-
max time kernel
42s -
max time network
15s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
06-05-2021 07:31
Static task
static1
Behavioral task
behavioral1
Sample
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe
Resource
win7v20210408
General
-
Target
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe
-
Size
845KB
-
MD5
0b39b28e51b4a0e47ebce7626cc9b79f
-
SHA1
8f3699a7fa6abeb247f80b92f3340df05741bd7e
-
SHA256
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50
-
SHA512
bebe1a1856bee0980491f742f52209fda9c64f0469f98c16098533b3b33648dd10c22c278f04f1e0db1c455385936de2d59690fe14f50031b964e54b33cb4ecc
Malware Config
Extracted
formbook
4.1
http://www.thefallofthedollar.com/ocq1/
mukadderaltintas.com
consultant-gov.com
readingroom.center
secretflux.com
diversifica.online
outervagina.com
doylespiritwear.com
musicianonwheels.com
spencer-media.com
juunoo-nord.com
sonorista.com
narenacademy.com
672461.com
swimtrue.com
wingleefruitstore.com
sailgadabout.com
dislosureservices.com
maryaab-lpc.com
thepoojastore.com
belaronconsulting.com
svncw.com
cruelsummer.asia
aatransferllc.com
dagamblingman.com
rentitslc.com
lucidpair.com
criacoesvicla.com
networkingdental.com
dylanfashion.com
cjelanaudiere.com
intisoenterprises.com
stvu-pxxre.xyz
richieshoes.com
lipshe.com
ixiaopang.net
lesinspireslesite.com
mycreditcardsplusus.com
towatchapp.com
thesouldeep.com
sensxai.com
charmingtxestates.com
geldoy.com
incometaxpe.com
xiaoxu.info
uguconsulting.com
arescsg.com
youreamagician.com
yousafzaiassociates.com
my-cell.xyz
truththewoodlands.com
belhernandezcomunicacion.com
mahoganysourcing.com
tdm.technology
item-obtain.com
rangers3.xyz
pabrikbajuanak.com
ttxwmfs.com
beachstoreonline.com
cnizslyza.icu
aboutexercising.com
magicmakeupbeauty.com
vrbaron.com
prankgeek.com
aftersalestraining.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-65-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1640-66-0x000000000041ED50-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exedescription pid process target process PID 1832 set thread context of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exepid process 1640 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exedescription pid process target process PID 1832 wrote to memory of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 1832 wrote to memory of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 1832 wrote to memory of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 1832 wrote to memory of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 1832 wrote to memory of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 1832 wrote to memory of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 1832 wrote to memory of 1640 1832 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe"C:\Users\Admin\AppData\Local\Temp\ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1640-65-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1640-66-0x000000000041ED50-mapping.dmp
-
memory/1640-68-0x0000000000B00000-0x0000000000E03000-memory.dmpFilesize
3.0MB
-
memory/1832-59-0x0000000000890000-0x0000000000891000-memory.dmpFilesize
4KB
-
memory/1832-61-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/1832-62-0x00000000003F0000-0x00000000003F5000-memory.dmpFilesize
20KB
-
memory/1832-63-0x0000000009270000-0x0000000009328000-memory.dmpFilesize
736KB
-
memory/1832-64-0x0000000000350000-0x00000000003B9000-memory.dmpFilesize
420KB