Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 06:46
Static task
static1
General
-
Target
418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe
-
Size
519KB
-
MD5
2ec3d70225772498f80108a182cce96c
-
SHA1
6da53a575bb0b6fb0bf43cb08a0d39bf7ba3f70c
-
SHA256
418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb
-
SHA512
f8f4c39601fdf1fe6e115c9b423fb89d5225b91eb82b4e758945e7143caef6fae55b3df3cd19940e12160f9ea494c3b464be6c3833254a6a78e5765e429e2322
Malware Config
Extracted
formbook
4.1
ed9s
http://www.vaughnmethod.com/ed9s/
pocketoptioniraq.com
merabestsolutions.com
atelectronics.site
fuxueshi.net
infinitystay.com
forensicconcept.site
txpmachine.com
masterwhs.xyz
dia-gnwsis.art
fulltiltnodes.com
bigbnbbsc.com
formation-figma.com
bonanacroin.net
medicalmarijuanasatx.com
bagnavy.com
aaegiscares.net
presentationpublicschool.com
bestyousite.site
prescriptionn.com
beyondthenormbouquets.com
sinclairsparkes.com
yesterdayglass.com
lj-safe-keepinganwgt76.xyz
winlegends.com
perthvideoproduction.com
sgh.technology
athletik.biz
cardealergame.com
ugkhmel.xyz
4346emerald.com
soulconstructionservices.com
dalmac-nj.com
marylink.net
gentciu.com
insidecity.company
wensum-creations.com
frontwonline.com
8xovz.xyz
pickaxecoffee.com
stonezhang.top
markmra1995.site
valleysettlewash.top
canadabulkmushrooms.com
shiningoutdoors.com
elysiarv.xyz
artoidmode.com
whileloading.com
crgcatherine.com
usa111.com
tourmalinesepiapirole.info
infodf.xyz
girldollg.xyz
paypal-caseid581.com
bymetronet.com
outranky.com
bankinsurance.site
iscinterconnectsolutions.com
networth.fyi
fastplaycdn.xyz
fernradio.com
sergeantrandom.net
islamic-coins.com
naplesgolfcartbatteries2u.com
seniormedicarebenefits.net
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2904-124-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2904-125-0x000000000041F160-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exedescription pid process target process PID 3048 set thread context of 2904 3048 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exepid process 2904 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 2904 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exedescription pid process target process PID 3048 wrote to memory of 2904 3048 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe PID 3048 wrote to memory of 2904 3048 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe PID 3048 wrote to memory of 2904 3048 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe PID 3048 wrote to memory of 2904 3048 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe PID 3048 wrote to memory of 2904 3048 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe PID 3048 wrote to memory of 2904 3048 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe 418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe"C:\Users\Admin\AppData\Local\Temp\418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe"C:\Users\Admin\AppData\Local\Temp\418d0a404118bfad6b0a926c6f8f8fd587d1a8517e92729531139c6bbe0c0ebb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2904-124-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2904-125-0x000000000041F160-mapping.dmp
-
memory/2904-126-0x00000000015B0000-0x00000000018D0000-memory.dmpFilesize
3.1MB
-
memory/3048-115-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/3048-117-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB
-
memory/3048-118-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/3048-119-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/3048-120-0x0000000005270000-0x000000000576E000-memory.dmpFilesize
5.0MB
-
memory/3048-121-0x0000000005F30000-0x0000000005F37000-memory.dmpFilesize
28KB
-
memory/3048-122-0x0000000008E60000-0x0000000008E61000-memory.dmpFilesize
4KB
-
memory/3048-123-0x0000000008E10000-0x0000000008E60000-memory.dmpFilesize
320KB