Analysis
-
max time kernel
89s -
max time network
69s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-07-2021 16:04
Static task
static1
Behavioral task
behavioral1
Sample
b60fb0b3174ffd6ccf46d23e5dd4f291.exe
Resource
win7v20210410
General
-
Target
b60fb0b3174ffd6ccf46d23e5dd4f291.exe
-
Size
1.6MB
-
MD5
b60fb0b3174ffd6ccf46d23e5dd4f291
-
SHA1
fedb0bc2f7e46d58061b8742b5d5ad61b525ab4f
-
SHA256
56d324b70dec3c259864216d918929470e10dc5582ae70f238aaad4887358d7b
-
SHA512
e5f7997d6b8df79d5897b438261eef644264d04d09604c5a0de485bee42df5c9374450949fb30097f7ab4e50de152d950b65f7ca5e1eea1e5088d8288a079aa6
Malware Config
Extracted
formbook
4.1
http://www.meilleurspromo.com/lmsa/
functionalkitchen.net
jiangxichuangke.com
lonerkont.space
champcarfanatics.com
csillag-szuletik.info
jupitowatch.com
lmcomputer.net
alfawize.com
mouthconsults.com
gruppolarta.com
gaymyway.com
bostonpeach.com
bioclean.pro
thingsandotherstuff.com
gencmetals.com
cwivf.com
nbhgddfgggnhhmhln.com
myscoutinglife.com
ccubk.com
cheapfloatingrentals.com
cryptofundit.com
localvocal.media
allaeat.com
djysddb.com
unifiui.com
corollabeachsetups.com
luckysevenboxesdesign.com
evanstiresetlement.com
rizubnclm.com
ambroja.com
startlivingbigger.com
bistro215.com
smartkarz.com
babybeardesigns.com
sgbizhu.com
koenbavzl.icu
55usu.com
palacenew.com
ikucherenko.com
onewilderness.travel
thelipglosskit.com
gabrielles.network
itaowong.com
visitgaytucson.com
joeboiden.com
billrecon.com
pakarpusaka.com
modelsnt.com
electionsector.com
nolanwalsh.com
funny-water.com
6768h88615.net
omae-mada.xyz
surkentkuruyemis.com
monarchlakeshouses.com
sledger17.com
virfthailand.com
nilou-abraham.com
grainsnspices.com
propertyinvestorleads.com
eattoevolvechallenge.com
jswjgd.com
rugpat.com
strobes.online
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1448-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1448-126-0x000000000041EB00-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b60fb0b3174ffd6ccf46d23e5dd4f291.exedescription pid process target process PID 808 set thread context of 1448 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe b60fb0b3174ffd6ccf46d23e5dd4f291.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b60fb0b3174ffd6ccf46d23e5dd4f291.exepid process 1448 b60fb0b3174ffd6ccf46d23e5dd4f291.exe 1448 b60fb0b3174ffd6ccf46d23e5dd4f291.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b60fb0b3174ffd6ccf46d23e5dd4f291.exedescription pid process Token: SeDebugPrivilege 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b60fb0b3174ffd6ccf46d23e5dd4f291.exedescription pid process target process PID 808 wrote to memory of 1448 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe b60fb0b3174ffd6ccf46d23e5dd4f291.exe PID 808 wrote to memory of 1448 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe b60fb0b3174ffd6ccf46d23e5dd4f291.exe PID 808 wrote to memory of 1448 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe b60fb0b3174ffd6ccf46d23e5dd4f291.exe PID 808 wrote to memory of 1448 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe b60fb0b3174ffd6ccf46d23e5dd4f291.exe PID 808 wrote to memory of 1448 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe b60fb0b3174ffd6ccf46d23e5dd4f291.exe PID 808 wrote to memory of 1448 808 b60fb0b3174ffd6ccf46d23e5dd4f291.exe b60fb0b3174ffd6ccf46d23e5dd4f291.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60fb0b3174ffd6ccf46d23e5dd4f291.exe"C:\Users\Admin\AppData\Local\Temp\b60fb0b3174ffd6ccf46d23e5dd4f291.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b60fb0b3174ffd6ccf46d23e5dd4f291.exe"C:\Users\Admin\AppData\Local\Temp\b60fb0b3174ffd6ccf46d23e5dd4f291.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/808-114-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/808-116-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/808-117-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/808-118-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/808-119-0x0000000005130000-0x0000000005131000-memory.dmpFilesize
4KB
-
memory/808-120-0x0000000005110000-0x000000000560E000-memory.dmpFilesize
5.0MB
-
memory/808-121-0x0000000005370000-0x0000000005371000-memory.dmpFilesize
4KB
-
memory/808-122-0x0000000002AE0000-0x0000000002B0D000-memory.dmpFilesize
180KB
-
memory/808-123-0x0000000006C10000-0x0000000006C85000-memory.dmpFilesize
468KB
-
memory/808-124-0x00000000055D0000-0x0000000005600000-memory.dmpFilesize
192KB
-
memory/1448-125-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1448-126-0x000000000041EB00-mapping.dmp
-
memory/1448-127-0x0000000001660000-0x0000000001980000-memory.dmpFilesize
3.1MB