Analysis
-
max time kernel
52s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
19-08-2021 09:03
Static task
static1
Behavioral task
behavioral1
Sample
83cc8405d694c0e1b3d7211202265f00.exe
Resource
win7v20210408
General
-
Target
83cc8405d694c0e1b3d7211202265f00.exe
-
Size
1010KB
-
MD5
83cc8405d694c0e1b3d7211202265f00
-
SHA1
5195443ab0c20c2b192aa18e911a002363069c64
-
SHA256
e2c11a82ce76ab32b7033c6d47081c6c44fe2288211fe0af6202f3333196cbe6
-
SHA512
bae273059ca86bbd6b078a658c1002b6d148a9dd69d75fc5ad9472240c6b3fbf824a229f7184bfca1e5867a264db37b60c1ad25792747d1561f38764eb74138e
Malware Config
Extracted
formbook
4.1
nff
http://www.yellow-wink.com/nff/
shinseikai.site
creditmystartup.com
howtovvbucks.com
betterfromthebeginning.com
oubacm.com
stonalogov.com
gentrypartyof8.com
cuesticksandsupplies.com
joelsavestheday.com
llanobnb.com
ecclogic.com
miempaque.com
cai23668.com
miscdr.net
twzhhq.com
bloomandbrewcafe.com
angcomleisure.com
mafeeboutique.com
300coin.club
brooksranchhomes.com
konversiondigital.com
dominivision.com
superiorshinedetailing.net
thehomechef.global
dating-web.site
gcbsclubc.com
mothererph.com
pacleanfuel.com
jerseryshorenflflagfootball.com
roberthyatt.com
wwwmacsports.com
tearor.com
american-ai.com
mkyiyuan.com
gempharmatechllc.com
verdijvtc.com
zimnik-bibo.one
heatherdarkauthor.net
dunn-labs.com
automotivevita.com
bersatubagaidulu.com
gorillarecruiting.com
mikecdmusic.com
femuveewedre.com
onyxmodsllc.com
ooweesports.com
dezeren.com
foeweifgoor73dz.com
sorchaashe.com
jamiitulivu.com
jifengshijie.com
ranchfiberglas.com
glendalesocialmediaagency.com
icuvietnam.com
404hapgood.com
planetturmeric.com
danfrem.com
amazonautomationbusiness.com
switchfinder.com
diversifiedforest.com
findnehomes.com
rsyueda.com
colombianmatrimony.com
evan-dawson.info
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/900-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/900-67-0x000000000041EAF0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
83cc8405d694c0e1b3d7211202265f00.exedescription pid process target process PID 2008 set thread context of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
83cc8405d694c0e1b3d7211202265f00.exe83cc8405d694c0e1b3d7211202265f00.exepid process 2008 83cc8405d694c0e1b3d7211202265f00.exe 2008 83cc8405d694c0e1b3d7211202265f00.exe 2008 83cc8405d694c0e1b3d7211202265f00.exe 900 83cc8405d694c0e1b3d7211202265f00.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
83cc8405d694c0e1b3d7211202265f00.exedescription pid process Token: SeDebugPrivilege 2008 83cc8405d694c0e1b3d7211202265f00.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
83cc8405d694c0e1b3d7211202265f00.exedescription pid process target process PID 2008 wrote to memory of 1748 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 1748 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 1748 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 1748 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe PID 2008 wrote to memory of 900 2008 83cc8405d694c0e1b3d7211202265f00.exe 83cc8405d694c0e1b3d7211202265f00.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83cc8405d694c0e1b3d7211202265f00.exe"C:\Users\Admin\AppData\Local\Temp\83cc8405d694c0e1b3d7211202265f00.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\83cc8405d694c0e1b3d7211202265f00.exe"C:\Users\Admin\AppData\Local\Temp\83cc8405d694c0e1b3d7211202265f00.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\83cc8405d694c0e1b3d7211202265f00.exe"C:\Users\Admin\AppData\Local\Temp\83cc8405d694c0e1b3d7211202265f00.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/900-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/900-67-0x000000000041EAF0-mapping.dmp
-
memory/900-68-0x0000000000AB0000-0x0000000000DB3000-memory.dmpFilesize
3.0MB
-
memory/2008-60-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2008-62-0x00000000048A0000-0x00000000048A1000-memory.dmpFilesize
4KB
-
memory/2008-63-0x0000000000610000-0x0000000000621000-memory.dmpFilesize
68KB
-
memory/2008-64-0x0000000005C20000-0x0000000005CD0000-memory.dmpFilesize
704KB
-
memory/2008-65-0x0000000004180000-0x00000000041C3000-memory.dmpFilesize
268KB