Analysis
-
max time kernel
97s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-07-2021 10:03
Static task
static1
Behavioral task
behavioral1
Sample
318c866ef078ec6d9597aaebed8bc370.exe
Resource
win7v20210410
General
-
Target
318c866ef078ec6d9597aaebed8bc370.exe
-
Size
799KB
-
MD5
318c866ef078ec6d9597aaebed8bc370
-
SHA1
4d0008cb7d64f6fb5378672bc4a2edba43546e1f
-
SHA256
54469ace58ddcfdd6d834574d87003857b0cda05e27a0b8e31cb0b58e6ca105d
-
SHA512
cd32fd72eda19e8a2210a3b646b21cbee5b722672773a49c0e4dc02fdaad9c9fb99a60326eb1a9589e4b02b3e30eb85e2c5a3b5cfd767155f72fa123f9e68985
Malware Config
Extracted
formbook
4.1
http://www.survivai.com/bsdd/
533dh.com
galerisikayet.xyz
tipsyalligator.com
crystalwellnessstudio.com
moovaap.com
lelfie.network
speedy-trips.com
prospectsolucoes.com
24x7customersservice.com
szbinsen.com
shikhardeals.com
totaldenta.com
ayksjx.com
avxrja.online
24kyule888.com
ufaw.net
spinozone.com
castvoicesmsreg.com
lajollawoodworks.com
renetyson.com
stephanieodennewsletter.com
tuben8.com
thescriptshack.com
macooperativeinc.com
franklinmachado.com
breezeescape.com
conv2app.com
kreditkarten-profi.com
czscjx.com
pvj2019.com
boosagroup.com
inesperienced.com
leschenaultpottery.com
sitvsfit.net
dwsykj.com
touchsquad.com
healthythomas.com
lphomeinspections.com
officialbondandunion.com
snowgreerfamilymemories.com
superheroesindisguise.com
topimportant.com
drillinginsider.com
esflog.net
baliyogacruise.net
sdys999.com
rugpat.com
solarpollo.com
kindrehearts.com
marijuana-medicine.com
thefinal7.com
guardiadeorixa.com
kayeducates.com
francorp.business
wegatherwegrow.com
quientequitalobailado.net
ghostridercreative.com
rachaeveal.com
sourcesysstems.com
xiuli100.com
xmjer.com
support-center-login.network
conversoronlline.com
misinformationnationmovie.com
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral2/memory/2152-126-0x000000000041EB30-mapping.dmp formbook behavioral2/memory/2152-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3944 set thread context of 2152 3944 318c866ef078ec6d9597aaebed8bc370.exe 81 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3944 318c866ef078ec6d9597aaebed8bc370.exe 3944 318c866ef078ec6d9597aaebed8bc370.exe 3944 318c866ef078ec6d9597aaebed8bc370.exe 3944 318c866ef078ec6d9597aaebed8bc370.exe 3944 318c866ef078ec6d9597aaebed8bc370.exe 3944 318c866ef078ec6d9597aaebed8bc370.exe 2152 318c866ef078ec6d9597aaebed8bc370.exe 2152 318c866ef078ec6d9597aaebed8bc370.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3944 318c866ef078ec6d9597aaebed8bc370.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3944 wrote to memory of 1972 3944 318c866ef078ec6d9597aaebed8bc370.exe 78 PID 3944 wrote to memory of 1972 3944 318c866ef078ec6d9597aaebed8bc370.exe 78 PID 3944 wrote to memory of 1972 3944 318c866ef078ec6d9597aaebed8bc370.exe 78 PID 3944 wrote to memory of 3980 3944 318c866ef078ec6d9597aaebed8bc370.exe 79 PID 3944 wrote to memory of 3980 3944 318c866ef078ec6d9597aaebed8bc370.exe 79 PID 3944 wrote to memory of 3980 3944 318c866ef078ec6d9597aaebed8bc370.exe 79 PID 3944 wrote to memory of 2112 3944 318c866ef078ec6d9597aaebed8bc370.exe 80 PID 3944 wrote to memory of 2112 3944 318c866ef078ec6d9597aaebed8bc370.exe 80 PID 3944 wrote to memory of 2112 3944 318c866ef078ec6d9597aaebed8bc370.exe 80 PID 3944 wrote to memory of 2152 3944 318c866ef078ec6d9597aaebed8bc370.exe 81 PID 3944 wrote to memory of 2152 3944 318c866ef078ec6d9597aaebed8bc370.exe 81 PID 3944 wrote to memory of 2152 3944 318c866ef078ec6d9597aaebed8bc370.exe 81 PID 3944 wrote to memory of 2152 3944 318c866ef078ec6d9597aaebed8bc370.exe 81 PID 3944 wrote to memory of 2152 3944 318c866ef078ec6d9597aaebed8bc370.exe 81 PID 3944 wrote to memory of 2152 3944 318c866ef078ec6d9597aaebed8bc370.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"2⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"2⤵PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"2⤵PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"C:\Users\Admin\AppData\Local\Temp\318c866ef078ec6d9597aaebed8bc370.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-