Analysis
-
max time kernel
129s -
max time network
133s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-05-2021 12:53
Static task
static1
Behavioral task
behavioral1
Sample
0987654345690987654356787654.exe
Resource
win7v20210408
General
-
Target
0987654345690987654356787654.exe
-
Size
647KB
-
MD5
8de5c116b2cde266b707582ade061a55
-
SHA1
21a6a11acfcd3c975efacf067d8b9db96072246c
-
SHA256
2efbb8abb0745a78dba6bdd6137619d948b47b352ab95732f00471831f95ad6d
-
SHA512
f50236d58dfb2c0670101b97e57fb780a48e0cddf34a60d28057f5cf9e6cfe91d1e87851c08de00480750977bb503596aedb51b1c06fea80a2057f4c1f4536fa
Malware Config
Extracted
formbook
4.1
http://www.btyaning.com/mpr/
314278.com
tantradarsan.com
benefitlmc.com
enterprisedisruptors.com
shoptesa.com
yourvirtualjob.com
queencz.com
meddypro.com
sarahcasias.com
mhrcbxnuwf.com
elgoldetuvida.com
veeyvmgwh.icu
virtualpos.info
handymanlothian.com
shopbond.com
21att.com
fluffbylaww.com
mcintyreanddodd.com
familycq.com
spareprelude.life
hay-segal.com
blackpannabis.com
cosmeticbrushesshop.com
scotia0web.com
luttelion.com
secur-real-estate.bid
fetch-property.info
valeriglasses.com
pyramidstech.com
blaktattoo.com
selfieledlightshop.com
dywawj.com
nandemo-system.com
globalglasspr.com
lownak.com
towergem.com
sageeverydamnthang.com
rcimpex.com
xcuti.com
harvestmoonproperties.com
vosy.net
musicformood.com
youngkicks.com
marketnow.club
interpostexpress.com
nobalt.com
aniamatucuerpo.com
barettateknoloji.com
costcutt.com
57thatchercres.com
apolloeconomicresearch.com
lifestrongskills.com
viridiumshop.com
atmanirbharhealth.com
rotationdietplan.com
sylviakweya.com
paraguardar.online
marcmoudi.com
puravia.services
yessense.online
synthroofpros.net
realestatering.com
nadiyarealtor.com
yyk86fsdjkaa.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3640-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3640-125-0x000000000041EA90-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0987654345690987654356787654.exedescription pid process target process PID 4432 set thread context of 3640 4432 0987654345690987654356787654.exe 0987654345690987654356787654.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0987654345690987654356787654.exepid process 3640 0987654345690987654356787654.exe 3640 0987654345690987654356787654.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0987654345690987654356787654.exedescription pid process Token: SeDebugPrivilege 4432 0987654345690987654356787654.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0987654345690987654356787654.exedescription pid process target process PID 4432 wrote to memory of 3640 4432 0987654345690987654356787654.exe 0987654345690987654356787654.exe PID 4432 wrote to memory of 3640 4432 0987654345690987654356787654.exe 0987654345690987654356787654.exe PID 4432 wrote to memory of 3640 4432 0987654345690987654356787654.exe 0987654345690987654356787654.exe PID 4432 wrote to memory of 3640 4432 0987654345690987654356787654.exe 0987654345690987654356787654.exe PID 4432 wrote to memory of 3640 4432 0987654345690987654356787654.exe 0987654345690987654356787654.exe PID 4432 wrote to memory of 3640 4432 0987654345690987654356787654.exe 0987654345690987654356787654.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0987654345690987654356787654.exe"C:\Users\Admin\AppData\Local\Temp\0987654345690987654356787654.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\0987654345690987654356787654.exe"C:\Users\Admin\AppData\Local\Temp\0987654345690987654356787654.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-