Analysis
-
max time kernel
64s -
max time network
46s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 16:13
Static task
static1
Behavioral task
behavioral1
Sample
56784137661c7e02c6c0e36b8fd217de.exe
Resource
win7v20210408
General
-
Target
56784137661c7e02c6c0e36b8fd217de.exe
-
Size
650KB
-
MD5
56784137661c7e02c6c0e36b8fd217de
-
SHA1
5b5d6c51607a99af40889379e369f8ecb98f95b8
-
SHA256
7d65154a5dc05da45ebfe7b8a5bdb4858bf80812060257a5bde5d90ab12b23a6
-
SHA512
fbf7c67d3598b7e62ee9eb77cb6e190672fdd9e635f07752c46e7e815083a90a5927e9e0a5c22eac66f836916cdb2724ddc03b9fec3c402b5b073c225f0f026e
Malware Config
Extracted
formbook
4.1
http://www.surreal-myzrael.com/z7a/
dotstories.xyz
egd-dz.com
caringhealthrecruit.com
transportdupont.com
teh-support.pro
catfad.com
pinewoodlakepool.net
pendekar-qq.info
duplicuty-garden.com
librtshop.com
stepmed.life
seatplusplus.com
bluzelle.money
weflew.xyz
bolaci.com
arrebatamentonews.com
sukesanblog.com
shadow-campaign.com
anpfiff.net
taste-of-poland.com
fortniting.com
hotels-congres.com
seven10sixty.com
sarahbeanfalo.net
qoslkkhqtg.net
balancewithdrjody.com
jinjulicm.com
vlccfixtures.com
formsautomationsolution.com
ssrinfo.com
viidegrees.com
blueskysites.com
asamedicalsystems.com
ukl.ink
energymanagerpro.com
teammcniffrealestate.com
ava.education
ericsmobileworkshop.com
top10shadetrees.com
renovialab.com
motorworld.rentals
delossantos4nc.com
kaisuo69.com
flyfishingdaily.com
easyhomeone.com
empeflix.com
firstfamilyofwdw.life
solevux.com
maycheer.store
unleashedword.com
supremenursery.com
stagenego.com
corona-massnahmengesetzii.info
adultwebmas.com
jackcockburn.com
ibalawyer.com
freeliving.xyz
cybersecuredad.com
virtualipassistant.com
800seyana.com
directlinestream.com
proprepflooring.com
kaustubhkokate.com
hoslergroup.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/1936-63-0x0000000000290000-0x000000000029B000-memory.dmp CustAttr -
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1104-67-0x000000000041EB30-mapping.dmp formbook behavioral1/memory/1104-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
56784137661c7e02c6c0e36b8fd217de.exedescription pid process target process PID 1936 set thread context of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
56784137661c7e02c6c0e36b8fd217de.exepid process 1104 56784137661c7e02c6c0e36b8fd217de.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
56784137661c7e02c6c0e36b8fd217de.exedescription pid process target process PID 1936 wrote to memory of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe PID 1936 wrote to memory of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe PID 1936 wrote to memory of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe PID 1936 wrote to memory of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe PID 1936 wrote to memory of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe PID 1936 wrote to memory of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe PID 1936 wrote to memory of 1104 1936 56784137661c7e02c6c0e36b8fd217de.exe 56784137661c7e02c6c0e36b8fd217de.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56784137661c7e02c6c0e36b8fd217de.exe"C:\Users\Admin\AppData\Local\Temp\56784137661c7e02c6c0e36b8fd217de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\56784137661c7e02c6c0e36b8fd217de.exe"C:\Users\Admin\AppData\Local\Temp\56784137661c7e02c6c0e36b8fd217de.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1104-67-0x000000000041EB30-mapping.dmp
-
memory/1104-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1104-68-0x0000000000770000-0x0000000000A73000-memory.dmpFilesize
3.0MB
-
memory/1936-60-0x0000000001270000-0x0000000001271000-memory.dmpFilesize
4KB
-
memory/1936-62-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/1936-63-0x0000000000290000-0x000000000029B000-memory.dmpFilesize
44KB
-
memory/1936-64-0x00000000051F0000-0x000000000526A000-memory.dmpFilesize
488KB
-
memory/1936-65-0x00000000005D0000-0x0000000000605000-memory.dmpFilesize
212KB