Analysis
-
max time kernel
118s -
max time network
157s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-08-2021 18:08
Static task
static1
Behavioral task
behavioral1
Sample
875d520c82087afa19b50355a0df7d50.exe
Resource
win7v20210410
General
-
Target
875d520c82087afa19b50355a0df7d50.exe
-
Size
838KB
-
MD5
875d520c82087afa19b50355a0df7d50
-
SHA1
910a982a2ec09f51c6205f2ab585abdb73fb1cda
-
SHA256
70d759be9f935d289ee1627038a118e9493d45ecebfcd477f0b43a8253afffb4
-
SHA512
8a53e26bbfc21255c3939ade4fd6b32eabd144874c14654a41e08b7924e2aa7c5cc4a6c7f309b2fd231c94ec31affb7f66aeb2c865e1f8d890883a46b9fb74a2
Malware Config
Extracted
formbook
4.1
mxwf
http://www.zahnimplantatangebotede.com/mxwf/
orders-cialis.info
auctionorbuy.com
meanmugsamore.com
yachtcrewmark.com
sacredkashilifestudio.net
themintyard.com
bragafoods.com
sierp.com
hausofdeme.com
anthonyjames915.com
bajardepesoencasa.com
marciaroyal.com
earringlifter.com
dsdjfhd9ddksa1as.info
bmzproekt.com
employmentbc.com
ptsdtreatment.space
vrchance.com
cnrongding.com
welovelit.com
intercourierdelivery.services
ianwhitewrite.com
afcerd.com
beneficiodemedicare.com
gatel3ess.com
salesnksportswt.top
thewellnessloft365.com
totensa.com
jessicatheisen.com
snowtographers.com
executrainpr.com
puttypaw.com
popcorntimeipad.com
heyconi.com
llanoresources.com
ibusinesshero.com
1euro1ad.com
sparkleeapp.com
zhuxiugyh.com
calvinmaphoto.com
bjmaomao.com
isaacfujiki.com
zipwhipper.com
kontrollstutzen.com
hannaheason.media
zgcbw.net
letteringdagabi.com
kitefabrics.com
andherieastoffices.com
thewellnesstravelcompany.info
ohio.works
beacharita.com
alphamillls.com
sassandvinegar.com
usauber.com
ceylonherbslk.com
richardggreenhill.com
groupdae.com
jupiterccc.com
indoovo.com
sunnytheodora.com
gxpgfz.com
shoppandaxpress.com
heiboard.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1132-67-0x000000000041EBA0-mapping.dmp formbook behavioral1/memory/1132-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
875d520c82087afa19b50355a0df7d50.exedescription pid process target process PID 864 set thread context of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
875d520c82087afa19b50355a0df7d50.exepid process 1132 875d520c82087afa19b50355a0df7d50.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
875d520c82087afa19b50355a0df7d50.exedescription pid process target process PID 864 wrote to memory of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe PID 864 wrote to memory of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe PID 864 wrote to memory of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe PID 864 wrote to memory of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe PID 864 wrote to memory of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe PID 864 wrote to memory of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe PID 864 wrote to memory of 1132 864 875d520c82087afa19b50355a0df7d50.exe 875d520c82087afa19b50355a0df7d50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\875d520c82087afa19b50355a0df7d50.exe"C:\Users\Admin\AppData\Local\Temp\875d520c82087afa19b50355a0df7d50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\875d520c82087afa19b50355a0df7d50.exe"C:\Users\Admin\AppData\Local\Temp\875d520c82087afa19b50355a0df7d50.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/864-60-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/864-62-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/864-63-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/864-64-0x0000000007F60000-0x0000000008004000-memory.dmpFilesize
656KB
-
memory/864-65-0x0000000000600000-0x0000000000637000-memory.dmpFilesize
220KB
-
memory/1132-67-0x000000000041EBA0-mapping.dmp
-
memory/1132-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1132-68-0x0000000000C50000-0x0000000000F53000-memory.dmpFilesize
3.0MB