Analysis
-
max time kernel
41s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
06-05-2021 07:31
Static task
static1
Behavioral task
behavioral1
Sample
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe
Resource
win7v20210408
General
-
Target
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe
-
Size
845KB
-
MD5
0b39b28e51b4a0e47ebce7626cc9b79f
-
SHA1
8f3699a7fa6abeb247f80b92f3340df05741bd7e
-
SHA256
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50
-
SHA512
bebe1a1856bee0980491f742f52209fda9c64f0469f98c16098533b3b33648dd10c22c278f04f1e0db1c455385936de2d59690fe14f50031b964e54b33cb4ecc
Malware Config
Extracted
formbook
4.1
http://www.thefallofthedollar.com/ocq1/
mukadderaltintas.com
consultant-gov.com
readingroom.center
secretflux.com
diversifica.online
outervagina.com
doylespiritwear.com
musicianonwheels.com
spencer-media.com
juunoo-nord.com
sonorista.com
narenacademy.com
672461.com
swimtrue.com
wingleefruitstore.com
sailgadabout.com
dislosureservices.com
maryaab-lpc.com
thepoojastore.com
belaronconsulting.com
svncw.com
cruelsummer.asia
aatransferllc.com
dagamblingman.com
rentitslc.com
lucidpair.com
criacoesvicla.com
networkingdental.com
dylanfashion.com
cjelanaudiere.com
intisoenterprises.com
stvu-pxxre.xyz
richieshoes.com
lipshe.com
ixiaopang.net
lesinspireslesite.com
mycreditcardsplusus.com
towatchapp.com
thesouldeep.com
sensxai.com
charmingtxestates.com
geldoy.com
incometaxpe.com
xiaoxu.info
uguconsulting.com
arescsg.com
youreamagician.com
yousafzaiassociates.com
my-cell.xyz
truththewoodlands.com
belhernandezcomunicacion.com
mahoganysourcing.com
tdm.technology
item-obtain.com
rangers3.xyz
pabrikbajuanak.com
ttxwmfs.com
beachstoreonline.com
cnizslyza.icu
aboutexercising.com
magicmakeupbeauty.com
vrbaron.com
prankgeek.com
aftersalestraining.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2068-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2068-125-0x000000000041ED50-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exedescription pid process target process PID 672 set thread context of 2068 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exeded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exepid process 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe 2068 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe 2068 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exedescription pid process Token: SeDebugPrivilege 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exedescription pid process target process PID 672 wrote to memory of 3796 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 3796 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 3796 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 2068 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 2068 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 2068 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 2068 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 2068 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe PID 672 wrote to memory of 2068 672 ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe"C:\Users\Admin\AppData\Local\Temp\ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\ded1197aa570850bc8885d3f4de9e056b9a585eeee5d511a9ee7b5c7432bdc50.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/672-114-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/672-116-0x0000000005EC0000-0x0000000005EC1000-memory.dmpFilesize
4KB
-
memory/672-117-0x00000000058B0000-0x00000000058B1000-memory.dmpFilesize
4KB
-
memory/672-118-0x00000000059C0000-0x0000000005EBE000-memory.dmpFilesize
5.0MB
-
memory/672-119-0x0000000005890000-0x0000000005891000-memory.dmpFilesize
4KB
-
memory/672-120-0x0000000008F60000-0x0000000008F61000-memory.dmpFilesize
4KB
-
memory/672-121-0x0000000005C90000-0x0000000005C95000-memory.dmpFilesize
20KB
-
memory/672-122-0x000000000A3C0000-0x000000000A478000-memory.dmpFilesize
736KB
-
memory/672-123-0x000000000C860000-0x000000000C8C9000-memory.dmpFilesize
420KB
-
memory/2068-124-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2068-125-0x000000000041ED50-mapping.dmp
-
memory/2068-127-0x00000000011D0000-0x00000000014F0000-memory.dmpFilesize
3.1MB