Analysis
-
max time kernel
71s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-09-2021 00:01
Static task
static1
General
-
Target
7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe
-
Size
495KB
-
MD5
b60d7ba369775810d35a8f9fdbc57e83
-
SHA1
91badba118714884ef1c4d51ec2e2680fb6078b9
-
SHA256
7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468
-
SHA512
3cb867066080ff4b168b4009260969c7c2093cf7ece6e786e2bbbf73b20f2b677829310b932f208e0c3d04bb3e77c9c081c54807bdbbb3931d3ac5865a0d5f76
Malware Config
Extracted
formbook
4.1
fzsg
http://www.grouplmc.com/fzsg/
thewetpatch.wtf
oceanfrontrecords.com
ultimatemecha.com
domainnameshq.com
schieksrvservice.com
bedandbreakfastitalia.cloud
rfmlc.com
hightechvids.com
greenvilledermotolgy.com
psilocybinforu.com
xjkerwen.com
euro-d-rev.com
shans-online.com
masterofcrypto.com
gamodaitaliana.online
lavivabet217.com
femsol.online
qafyzey.site
kang17.xyz
kilimlove.com
absolutadventures.com
flpfit.com
march2meta.com
white-stag.com
yuminxing.com
doohoeek.com
cuellarjewelry.com
amatoauthor.com
redkentrecords.com
982379.com
exchangegarment.com
tonymarra.net
fazenbaker.email
thotexperiment.net
redstreetinfo.cloud
cfhuijin.com
zjjyfd.com
protracksbackingtracks.online
forexcord.com
academe.tips
desertclouds.net
wa1399.xyz
myshopi8fy.com
1mm5frev.xyz
ibtfwdsfbcncrnuenh.net
rustydrewingchevrolet.com
jlab-jobs.com
yoshiki628.top
cft8j.com
dstvideo.com
lojamegasolucao.store
alsemenov.online
turkishtutorials.com
bonngoecapital.com
markline-gbg.com
emasterysuccess.com
photographybydolores.com
adanisantasi.com
pestrelief.xyz
thailandland.net
comocobrarcontarjeta.com
adaiahsboutique.com
gourmetvegan.biz
baowuenergy.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3008-124-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3008-125-0x000000000041F100-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exedescription pid process target process PID 3628 set thread context of 3008 3628 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exepid process 3008 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 3008 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exedescription pid process target process PID 3628 wrote to memory of 3008 3628 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe PID 3628 wrote to memory of 3008 3628 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe PID 3628 wrote to memory of 3008 3628 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe PID 3628 wrote to memory of 3008 3628 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe PID 3628 wrote to memory of 3008 3628 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe PID 3628 wrote to memory of 3008 3628 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe 7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe"C:\Users\Admin\AppData\Local\Temp\7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe"C:\Users\Admin\AppData\Local\Temp\7e647d064a55731e15f05904b636037d2339e84ca425f53cf752004cd8797468.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-