Analysis
-
max time kernel
95s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
31-08-2021 07:26
Static task
static1
Behavioral task
behavioral1
Sample
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe
Resource
win7v20210408
General
-
Target
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe
-
Size
884KB
-
MD5
1b415a56616a9f7c2e37fc2ce570664f
-
SHA1
2e7a5b8378e9a0e5fd7f5a8321af4d128ef2a1a3
-
SHA256
14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd
-
SHA512
e77e25ffeae630cc2413fd969462a7fd019738f2981b4304ab6ba4cc5bb9530db3f1210c5cb90665529f6c25c03f6a63362362a18e6bb801edeccc979a0f711b
Malware Config
Extracted
formbook
4.1
vn3b
http://www.lifeafterbobby.com/vn3b/
rowenglobal.com
abrirumaempresa.com
videosbet.xyz
blackbettyxt.com
trust-red.net
sonyalpharunors.com
shiqichaoji.com
allex-ru.com
totalpowerpc.store
ptocom.com
quantumsai.club
toughcookie.love
nivafitness.com
bioskopmovie21.com
giatsaygiare.com
xiongmaojingxuan.com
zjjly88.com
trampmotorsports.com
pibblekibble.com
mymounntnittanyhealth.com
thesysonline.com
thegioimyphamduc-nhat.info
uninegi.com
keystaenterprises.com
jlkfp.com
namikuid.com
tomverkuijlen.com
tamcotiresshop.com
wanb88.com
livedirecthdtv24.xyz
orangestoreusa.com
nextgenerationsolutions.info
krazytiedyes.com
localdailyobserver.com
meg-as.com
ksubaka-intl.com
secretlove4you.com
sesionmx1.online
losninosygi.com
kootenaydiscsupply.com
cmacconstructionbuild.com
dxgav58.com
verdenit.com
findinghonesty.com
noodoeos.com
generiscollection.com
getridofmole.com
navniddhiprinting.com
2gether.company
kmm-design.com
valengz.com
extremefabportal.com
homeapplianceexpert.com
goldcoin.bet
tranz4mations.com
reliefgift.com
rspermatabekasi.com
chelseaavan.com
devicharanadda.com
celebritymesh.com
nurse2nurse.info
theexpertinsuranceagency.com
wygouji.com
marvinlucassuperpac.com
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral2/memory/3284-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3284-126-0x000000000041EB70-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4016 set thread context of 3284 4016 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 78 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3284 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 3284 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4016 wrote to memory of 3284 4016 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 78 PID 4016 wrote to memory of 3284 4016 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 78 PID 4016 wrote to memory of 3284 4016 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 78 PID 4016 wrote to memory of 3284 4016 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 78 PID 4016 wrote to memory of 3284 4016 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 78 PID 4016 wrote to memory of 3284 4016 14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"C:\Users\Admin\AppData\Local\Temp\14ebcbc69653d3257eb42c91734bcf2a1ca5dff12c31c06cf955279ea4af5bfd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-