Analysis
-
max time kernel
117s -
max time network
19s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
06-05-2021 07:28
Static task
static1
Behavioral task
behavioral1
Sample
0282fb6d3422cdebf88ba2d9ce0831af.exe
Resource
win7v20210408
General
-
Target
0282fb6d3422cdebf88ba2d9ce0831af.exe
-
Size
751KB
-
MD5
0282fb6d3422cdebf88ba2d9ce0831af
-
SHA1
f0c80f1d6ace27df947df38aae7b11ed4b6d7144
-
SHA256
4fb3bfa3afd4fd027aff55a6cbbc8c3d92fb5dd84bca9d88ff893928a41b9a0a
-
SHA512
ab8df1a2b5feb03c0df351a215d6e9bb16c3b92853aab0fe7c96308fa94e1eefc362a23cff5e61da2a3e93f28e44a9954b23e363ff6dbc72ac90da95c5f8e6de
Malware Config
Extracted
formbook
4.1
http://www.projectx-dev.net/hci/
0357shop.com
cinargenerator.com
freshwes.com
dance-pods.com
cptinsano.com
animaltales1.com
ridernationusa.com
christophergagnon.com
bzjp.icu
culturefap.com
illustrationtees.com
handwritingwork.com
thebullrunranch.com
wujingli.com
wifihouten.online
okavagegroup.com
makaladiggsfitness.com
ruvapy.com
customergirl.com
guangzhoushujukuzxtftf.com
holisticuniversal.com
temizlikciyim.com
hyggespaceco.com
superlucky.site
nizacarssuppliers.net
nanchangbus.com
advertistechnology.com
gerardopadilla.com
kittycrashcourse.com
zhiguanjiaoyu.com
editionsculte.com
tech-bombay.com
haumeya.com
bfsleadership.com
placemybeats.com
contigocosmeticos.com
ajshaonan.com
sun-moana.com
texasfinestfencemore.com
kredtra.net
xadzxx.com
relialed.com
1133nwood1n.info
boysduvetcovers.com
tagenergypartners.com
glz-curatelle.com
krewdog.com
cemexmexico.online
contadortico.com
cepmax.xyz
leanistic.com
financefairyy.com
lelaandcohairstudio.com
lmlwealthmanagement.com
virtual-tokyotower.com
wherecoins.com
simplenskin.com
safecareethiopia.net
out-there-supply.com
beautifulcrete.com
speararts.com
kingsluxuryinternational.com
exoticomistico.com
stoneridgeweddingvenues.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/704-67-0x000000000041EB90-mapping.dmp formbook behavioral1/memory/704-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0282fb6d3422cdebf88ba2d9ce0831af.exedescription pid process target process PID 1096 set thread context of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0282fb6d3422cdebf88ba2d9ce0831af.exepid process 704 0282fb6d3422cdebf88ba2d9ce0831af.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
0282fb6d3422cdebf88ba2d9ce0831af.exedescription pid process target process PID 1096 wrote to memory of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe PID 1096 wrote to memory of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe PID 1096 wrote to memory of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe PID 1096 wrote to memory of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe PID 1096 wrote to memory of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe PID 1096 wrote to memory of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe PID 1096 wrote to memory of 704 1096 0282fb6d3422cdebf88ba2d9ce0831af.exe 0282fb6d3422cdebf88ba2d9ce0831af.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0282fb6d3422cdebf88ba2d9ce0831af.exe"C:\Users\Admin\AppData\Local\Temp\0282fb6d3422cdebf88ba2d9ce0831af.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\0282fb6d3422cdebf88ba2d9ce0831af.exe"C:\Users\Admin\AppData\Local\Temp\0282fb6d3422cdebf88ba2d9ce0831af.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:704
-