Analysis
-
max time kernel
90s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
06-07-2021 09:16
Static task
static1
Behavioral task
behavioral1
Sample
1b415a56616a9f7c2e37fc2ce570664f.exe
Resource
win7v20210410
General
-
Target
1b415a56616a9f7c2e37fc2ce570664f.exe
-
Size
884KB
-
MD5
1b415a56616a9f7c2e37fc2ce570664f
-
SHA1
2e7a5b8378e9a0e5fd7f5a8321af4d128ef2a1a3
-
SHA256
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd
-
SHA512
e77e25ffeae630cc2413fd969462a7fd019738f2981b4304ab6ba4cc5bb9530db3f1210c5cb90665529f6c25c03f6a63362362a18e6bb801edeccc979a0f711b
Malware Config
Extracted
formbook
4.1
http://www.lifeafterbobby.com/vn3b/
rowenglobal.com
abrirumaempresa.com
videosbet.xyz
blackbettyxt.com
trust-red.net
sonyalpharunors.com
shiqichaoji.com
allex-ru.com
totalpowerpc.store
ptocom.com
quantumsai.club
toughcookie.love
nivafitness.com
bioskopmovie21.com
giatsaygiare.com
xiongmaojingxuan.com
zjjly88.com
trampmotorsports.com
pibblekibble.com
mymounntnittanyhealth.com
thesysonline.com
thegioimyphamduc-nhat.info
uninegi.com
keystaenterprises.com
jlkfp.com
namikuid.com
tomverkuijlen.com
tamcotiresshop.com
wanb88.com
livedirecthdtv24.xyz
orangestoreusa.com
nextgenerationsolutions.info
krazytiedyes.com
localdailyobserver.com
meg-as.com
ksubaka-intl.com
secretlove4you.com
sesionmx1.online
losninosygi.com
kootenaydiscsupply.com
cmacconstructionbuild.com
dxgav58.com
verdenit.com
findinghonesty.com
noodoeos.com
generiscollection.com
getridofmole.com
navniddhiprinting.com
2gether.company
kmm-design.com
valengz.com
extremefabportal.com
homeapplianceexpert.com
goldcoin.bet
tranz4mations.com
reliefgift.com
rspermatabekasi.com
chelseaavan.com
devicharanadda.com
celebritymesh.com
nurse2nurse.info
theexpertinsuranceagency.com
wygouji.com
marvinlucassuperpac.com
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral1/memory/764-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/764-67-0x000000000041EB70-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1904 set thread context of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 764 1b415a56616a9f7c2e37fc2ce570664f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1904 1b415a56616a9f7c2e37fc2ce570664f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1904 wrote to memory of 396 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 29 PID 1904 wrote to memory of 396 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 29 PID 1904 wrote to memory of 396 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 29 PID 1904 wrote to memory of 396 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 29 PID 1904 wrote to memory of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30 PID 1904 wrote to memory of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30 PID 1904 wrote to memory of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30 PID 1904 wrote to memory of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30 PID 1904 wrote to memory of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30 PID 1904 wrote to memory of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30 PID 1904 wrote to memory of 764 1904 1b415a56616a9f7c2e37fc2ce570664f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"2⤵PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-