Analysis
-
max time kernel
62s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-07-2021 08:40
Static task
static1
Behavioral task
behavioral1
Sample
5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe
Resource
win7v20210408
General
-
Target
5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe
-
Size
612KB
-
MD5
bdc8aab5dc8803a80050a28c39171069
-
SHA1
5db1b401d54eb87dfe5260ba2f3a4077b692aac3
-
SHA256
6444b0f41e6046055462a6b4837fdf509f403e01f3a3c46899548ec0ee9fbfdc
-
SHA512
a1dc7fbfe4009bf5aa44262399dd1caf18f7901e3c5ee70540ad58ab5a668db6040c461ff2debfbfb5edad0fec524193249fbb8313263772be65348369b707eb
Malware Config
Extracted
formbook
4.1
http://www.containerflippers.com/np0c/
spartansurebets.com
threelakestradingco.com
metaspace.global
zjenbao.com
directlyincluded.press
peterchadri.com
learnhousebreaking.com
wonobattle.online
leadate.com
shebafarmscali.com
top4thejob.online
awakeyourfaith.com
bedford-st.com
lolwhats.com
cucurumbel.com
lokalbazaar.com
matter.pro
eastcountyanimalrescue.com
musesgirl.com
noordinarydairy.com
saigonstar2.com
farmacias-aranda.com
fjzzck.com
createandelevate.solutions
australiavapeoil.com
imperfectlymassabella.com
criminalmindeddesign.com
silverstoneca.com
scotlandpropertygroup.com
3dvbuild.com
privatebeautysuites.com
driplockerstore.com
rcdesigncompany.com
2141cascaderdsw.com
mybbblog.com
bodyambrosia.com
solitudeblog.com
coworkingofficespaces.com
9999cpa.com
flipwo.com
dynamicfitnesslife.store
anandsharmah.com
afyz-jf7y.net
erikagrandstaff.com
pumpfoil.com
bodurm.com
goldlifetime.com
a1organ.com
akomandr.com
hsavvysupply.com
dyvyn.com
bizlikeabosslady.network
livein.space
helpafounderout.com
orbmena.com
mrrodgersrealty.com
roxhomeswellington.com
klimareporter.com
1040fourthst405.com
blackbuiltbusinesses.com
solidswim.com
lordetkinlik3.com
gardencontainerbar.com
viperporn.net
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3296-128-0x000000000041EB90-mapping.dmp formbook behavioral2/memory/3296-127-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exedescription pid process target process PID 4060 set thread context of 3296 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exepid process 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 3296 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 3296 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exedescription pid process Token: SeDebugPrivilege 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exedescription pid process target process PID 4060 wrote to memory of 3296 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe PID 4060 wrote to memory of 3296 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe PID 4060 wrote to memory of 3296 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe PID 4060 wrote to memory of 3296 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe PID 4060 wrote to memory of 3296 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe PID 4060 wrote to memory of 3296 4060 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe 5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe"C:\Users\Admin\AppData\Local\Temp\5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exeC:\Users\Admin\AppData\Local\Temp\5db1b401d54eb87dfe5260ba2f3a4077b692aac3.exe VGHBH2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3296-128-0x000000000041EB90-mapping.dmp
-
memory/3296-127-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3296-129-0x0000000001850000-0x0000000001B70000-memory.dmpFilesize
3.1MB
-
memory/4060-114-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/4060-116-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/4060-117-0x0000000004C40000-0x0000000004C41000-memory.dmpFilesize
4KB
-
memory/4060-118-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/4060-119-0x0000000004C40000-0x000000000513E000-memory.dmpFilesize
5.0MB
-
memory/4060-120-0x00000000066B0000-0x000000000670C000-memory.dmpFilesize
368KB
-
memory/4060-125-0x0000000007000000-0x0000000007067000-memory.dmpFilesize
412KB
-
memory/4060-126-0x0000000004C40000-0x000000000513E000-memory.dmpFilesize
5.0MB