Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-10-2021 19:44
Static task
static1
Behavioral task
behavioral1
Sample
1b409f19f166463379e0211aced1af99.exe
Resource
win7-en-20211014
General
-
Target
1b409f19f166463379e0211aced1af99.exe
-
Size
348KB
-
MD5
1b409f19f166463379e0211aced1af99
-
SHA1
d15127da7d1de660a66e9062c81131d9c3fd9d4b
-
SHA256
a2dd12adec362ce7457da7795a1b0505dc2c88ab322a1c59637e8196528739f0
-
SHA512
8d7f1b7814daae7e77334524a6ecfc12c401b94a62e10fbddb5928af87af83d37885ece12b5d95228ad5314209c201348a1b44d5dadd6661fae5e4a050786e65
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1900-65-0x000000000041F150-mapping.dmp formbook behavioral1/memory/1900-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1b409f19f166463379e0211aced1af99.exedescription pid process target process PID 2024 set thread context of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1b409f19f166463379e0211aced1af99.exepid process 1900 1b409f19f166463379e0211aced1af99.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
1b409f19f166463379e0211aced1af99.exedescription pid process target process PID 2024 wrote to memory of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe PID 2024 wrote to memory of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe PID 2024 wrote to memory of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe PID 2024 wrote to memory of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe PID 2024 wrote to memory of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe PID 2024 wrote to memory of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe PID 2024 wrote to memory of 1900 2024 1b409f19f166463379e0211aced1af99.exe 1b409f19f166463379e0211aced1af99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b409f19f166463379e0211aced1af99.exe"C:\Users\Admin\AppData\Local\Temp\1b409f19f166463379e0211aced1af99.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1b409f19f166463379e0211aced1af99.exe"C:\Users\Admin\AppData\Local\Temp\1b409f19f166463379e0211aced1af99.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1900-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1900-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1900-65-0x000000000041F150-mapping.dmp
-
memory/1900-64-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1900-66-0x0000000000A70000-0x0000000000D73000-memory.dmpFilesize
3.0MB
-
memory/2024-55-0x0000000000A10000-0x0000000000A11000-memory.dmpFilesize
4KB
-
memory/2024-57-0x0000000075D41000-0x0000000075D43000-memory.dmpFilesize
8KB
-
memory/2024-58-0x0000000004650000-0x0000000004651000-memory.dmpFilesize
4KB
-
memory/2024-59-0x00000000004C0000-0x00000000004C7000-memory.dmpFilesize
28KB
-
memory/2024-60-0x000000007EF40000-0x000000007EF41000-memory.dmpFilesize
4KB
-
memory/2024-61-0x00000000048A0000-0x00000000048F0000-memory.dmpFilesize
320KB