Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-07-2021 07:17
Static task
static1
Behavioral task
behavioral1
Sample
79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe
Resource
win7v20210410
General
-
Target
79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe
-
Size
716KB
-
MD5
80a7d8ecbc520bdbb9e92fc0883fc3bf
-
SHA1
77130d8315019413a3c3f68ca7ebe3b522a41a74
-
SHA256
79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b
-
SHA512
1648734c85804a8d6d3af028eb857621e0e8bd130890f28f6e58e36c402226eb76c073c4d8a4c14d5c5103e661965993374e6e7fd599fe8224b149b8023e374e
Malware Config
Extracted
formbook
4.1
http://www.sunderstudios.com/blo/
introducingsadieann.com
batterrydaddy.com
restaurantechoytac.digital
toriox.tech
cursosonline.pro
onegreenmother.com
canyonpark-home.com
charleserick9.com
coldavis-81720-1634.com
deliandgyros.com
darrenjmajor.com
chekax.com
twinsepower.com
welinkautollc.com
kimlmontgomery.com
ligature.net
bllbirdcrk.com
happilyeverfi.com
hahdigitalmarketinghelp.com
onecomcall.com
createanewyoucoaching.com
nocoky.com
saibamaisweboficial.com
ashtondrakr.com
fronteracater.com
outridermtb.com
wahinehealth.net
viksfitflow.com
redakgroup.com
tpabgd.com
chtc100.com
homeedgestore.com
proxyshops.com
nasakefashions.com
adindia.online
ryanleek.com
thecantonmentcookhouse.com
staszic.xyz
hondaandacuracollision.com
flzyzh.com
lakewoodluxury.com
lisetteperez.media
ronandmarie.com
karlhagan.com
peterrobinson.online
swfjobs.net
stylediaryavenue.com
gallayo.com
mon-test-qi.com
dominandoseuinstrumento.com
translationserviceguide.com
studiosettanta.com
view-millc.com
tadzkirah.com
virtual3devents.com
babehou.com
bbwsboutique.com
resurrectiondesignco.net
kitsmake.com
curiousparty.com
yugen-us.menu
melaninmagicthings.com
nudemburadatatlim.com
browntravelingnotary.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-65-0x000000000041EB40-mapping.dmp formbook behavioral1/memory/1652-64-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exedescription pid process target process PID 1888 set thread context of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exepid process 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 1652 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exedescription pid process Token: SeDebugPrivilege 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exedescription pid process target process PID 1888 wrote to memory of 1644 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1644 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1644 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1644 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe PID 1888 wrote to memory of 1652 1888 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe 79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe"C:\Users\Admin\AppData\Local\Temp\79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe"C:\Users\Admin\AppData\Local\Temp\79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe"2⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe"C:\Users\Admin\AppData\Local\Temp\79b58cbefa964dfc78a5fbf12179eeb101912ddce145a68c9142cfbf9cbb120b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652