Analysis
-
max time kernel
81s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-07-2021 09:16
Static task
static1
Behavioral task
behavioral1
Sample
1b415a56616a9f7c2e37fc2ce570664f.exe
Resource
win7v20210410
General
-
Target
1b415a56616a9f7c2e37fc2ce570664f.exe
-
Size
884KB
-
MD5
1b415a56616a9f7c2e37fc2ce570664f
-
SHA1
2e7a5b8378e9a0e5fd7f5a8321af4d128ef2a1a3
-
SHA256
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd
-
SHA512
e77e25ffeae630cc2413fd969462a7fd019738f2981b4304ab6ba4cc5bb9530db3f1210c5cb90665529f6c25c03f6a63362362a18e6bb801edeccc979a0f711b
Malware Config
Extracted
formbook
4.1
http://www.lifeafterbobby.com/vn3b/
rowenglobal.com
abrirumaempresa.com
videosbet.xyz
blackbettyxt.com
trust-red.net
sonyalpharunors.com
shiqichaoji.com
allex-ru.com
totalpowerpc.store
ptocom.com
quantumsai.club
toughcookie.love
nivafitness.com
bioskopmovie21.com
giatsaygiare.com
xiongmaojingxuan.com
zjjly88.com
trampmotorsports.com
pibblekibble.com
mymounntnittanyhealth.com
thesysonline.com
thegioimyphamduc-nhat.info
uninegi.com
keystaenterprises.com
jlkfp.com
namikuid.com
tomverkuijlen.com
tamcotiresshop.com
wanb88.com
livedirecthdtv24.xyz
orangestoreusa.com
nextgenerationsolutions.info
krazytiedyes.com
localdailyobserver.com
meg-as.com
ksubaka-intl.com
secretlove4you.com
sesionmx1.online
losninosygi.com
kootenaydiscsupply.com
cmacconstructionbuild.com
dxgav58.com
verdenit.com
findinghonesty.com
noodoeos.com
generiscollection.com
getridofmole.com
navniddhiprinting.com
2gether.company
kmm-design.com
valengz.com
extremefabportal.com
homeapplianceexpert.com
goldcoin.bet
tranz4mations.com
reliefgift.com
rspermatabekasi.com
chelseaavan.com
devicharanadda.com
celebritymesh.com
nurse2nurse.info
theexpertinsuranceagency.com
wygouji.com
marvinlucassuperpac.com
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral2/memory/2388-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2388-126-0x000000000041EB70-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3540 set thread context of 2388 3540 1b415a56616a9f7c2e37fc2ce570664f.exe 78 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2388 1b415a56616a9f7c2e37fc2ce570664f.exe 2388 1b415a56616a9f7c2e37fc2ce570664f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3540 wrote to memory of 2388 3540 1b415a56616a9f7c2e37fc2ce570664f.exe 78 PID 3540 wrote to memory of 2388 3540 1b415a56616a9f7c2e37fc2ce570664f.exe 78 PID 3540 wrote to memory of 2388 3540 1b415a56616a9f7c2e37fc2ce570664f.exe 78 PID 3540 wrote to memory of 2388 3540 1b415a56616a9f7c2e37fc2ce570664f.exe 78 PID 3540 wrote to memory of 2388 3540 1b415a56616a9f7c2e37fc2ce570664f.exe 78 PID 3540 wrote to memory of 2388 3540 1b415a56616a9f7c2e37fc2ce570664f.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"C:\Users\Admin\AppData\Local\Temp\1b415a56616a9f7c2e37fc2ce570664f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-