Analysis
-
max time kernel
61s -
max time network
49s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
22-07-2021 08:02
Static task
static1
Behavioral task
behavioral1
Sample
ed43ff447cd5486610731a627a930607.exe
Resource
win7v20210410
General
-
Target
ed43ff447cd5486610731a627a930607.exe
-
Size
1.1MB
-
MD5
ed43ff447cd5486610731a627a930607
-
SHA1
91449c85fb2fa5d27f8db3c8c08cdfb9d3287162
-
SHA256
91cdb947644a5a802adac7583a79e7e560da38839489a02e7464730ff66fd004
-
SHA512
3bd5692c8b81221a2b1e83b17b36872fc664935ed14d6d645dd0efa6e2725c0c95598e4871b358092fbb406e8eb4600face90aa1b98fe5720fd4629ff2903a1d
Malware Config
Extracted
formbook
4.1
http://www.hometowncashbuyersgroup.com/kkt/
inspirafutebol.com
customgiftshouston.com
mycreativelending.com
psplaystore.com
newlivingsolutionshop.com
dechefamsterdam.com
servicingl0ans.com
atsdholdings.com
manifestarz.com
sequenceanalytica.com
gethealthcaresmart.com
theartofsurprises.com
pirateequitypatrick.com
alliance-ce.com
wingrushusa.com
funtimespheres.com
solevux.com
antimasathya.com
profitexcavator.com
lankeboxshop.com
aarthiramamurthy.com
oldmopaiv.xyz
mavispaguzellik.com
milkamax.com
sputnikvasisi.com
gametoyou.com
sisconbol.com
thedreamcertificate.com
vichy-menuiserie.com
pv-step.com
growingmindstrilingual.com
tlcrentny.com
jedshomebuilders.com
curtailit.com
integruschamber.com
lanzamientosbimbocolombia.com
tightlinesfishingco.com
doubleuphome.com
arctic.solar
unstopabbledomains.com
aggiornamento-isp.info
clarkandhurnlaw.com
barefootbirthstl.com
seanfeuct.com
measureformeasurehome.com
stephsavy.com
loveflowersandevents.com
czsis.com
midnightblueinc.com
today.dental
customwithme.com
edisetiyo.com
jasoneganrealtor.com
rihxertiza.com
seahorseblast.net
nedayerasa.com
cliftonheightshoa.net
theprofilemba.com
cfwoods.com
dogggo.com
casatranquillainletbeach.com
u1023.com
aromakapseln.com
zhwanjie.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/548-67-0x000000000041EBD0-mapping.dmp formbook behavioral1/memory/548-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ed43ff447cd5486610731a627a930607.exedescription pid process target process PID 1816 set thread context of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ed43ff447cd5486610731a627a930607.exepid process 548 ed43ff447cd5486610731a627a930607.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ed43ff447cd5486610731a627a930607.exedescription pid process target process PID 1816 wrote to memory of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe PID 1816 wrote to memory of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe PID 1816 wrote to memory of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe PID 1816 wrote to memory of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe PID 1816 wrote to memory of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe PID 1816 wrote to memory of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe PID 1816 wrote to memory of 548 1816 ed43ff447cd5486610731a627a930607.exe ed43ff447cd5486610731a627a930607.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed43ff447cd5486610731a627a930607.exe"C:\Users\Admin\AppData\Local\Temp\ed43ff447cd5486610731a627a930607.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ed43ff447cd5486610731a627a930607.exe"C:\Users\Admin\AppData\Local\Temp\ed43ff447cd5486610731a627a930607.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/548-67-0x000000000041EBD0-mapping.dmp
-
memory/548-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/548-68-0x0000000000B80000-0x0000000000E83000-memory.dmpFilesize
3.0MB
-
memory/1816-60-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1816-62-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/1816-63-0x00000000003C0000-0x00000000003DB000-memory.dmpFilesize
108KB
-
memory/1816-64-0x0000000005F30000-0x0000000005FA9000-memory.dmpFilesize
484KB
-
memory/1816-65-0x0000000000880000-0x00000000008B5000-memory.dmpFilesize
212KB