Analysis
-
max time kernel
110s -
max time network
125s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
e17b528f9c192653dc9777bd46e48d82.exe
Resource
win7-en-20210920
General
-
Target
e17b528f9c192653dc9777bd46e48d82.exe
-
Size
521KB
-
MD5
e17b528f9c192653dc9777bd46e48d82
-
SHA1
f4dfc93942ed0c091340057f1164b1e1e6f4a148
-
SHA256
83708560ecc442b5b6dadbdf5af39ae4f1e843664c932a9de3eff1e38bf6d4a5
-
SHA512
d041efc3a98c8fc690841669f3e9722c43bbee4c6eac7191056b7dff5b8c27d938bf9f7de3409f27239cadf46c70696c12a9c98e86f772339e902b295060ae29
Malware Config
Extracted
formbook
4.1
s18y
http://www.agentpathleurre.space/s18y/
jokes-online.com
dzzdjn.com
lizzieerhardtebnaryepptts.com
interfacehand.xyz
sale-m.site
block-facebook.com
dicasdamadrinha.com
maythewind.com
hasari.net
omnists.com
thevalley-eg.com
rdfj.xyz
szhfcy.com
alkalineage.club
fdf.xyz
absorplus.com
poldolongo.com
badassshirts.club
ferienwohnungenmv.com
bilboondokoak.com
ambrosiaaudio.com
lifeneurologyclub.com
femboys.world
blehmails.com
gametimebg.com
duytienauto.net
owerful.com
amedicalsupplyco.com
americonnlogistics.com
ateamautoglassga.com
clickstool.com
fzdzcnj.com
txtgo.xyz
izassist.com
3bangzhu.com
myesstyle.com
aek181129aek.xyz
daoxinghumaotest.com
jxdg.xyz
restorationculturecon.com
thenaturalnutrient.com
sportsandgames.info
spiderwebinar.net
erqgseidx.com
donutmastermind.com
aidatislemleri-govtr.com
weetsist.com
sunsetschoolportaits.com
exodusguarant.tech
gsnbls.top
huangdashi33.xyz
amazonretoure.net
greathomeinlakewood.com
lenovoidc.com
qiuhenglawfirm.com
surveyorslimited.com
carterscts.com
helmosy.online
bakersfieldlaughingstock.com
as-payjrku.icu
mr-exclusive.com
givepy.info
ifvita.com
obesocarpinteria.online
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3680-124-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3680-125-0x000000000041F120-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e17b528f9c192653dc9777bd46e48d82.exedescription pid process target process PID 352 set thread context of 3680 352 e17b528f9c192653dc9777bd46e48d82.exe e17b528f9c192653dc9777bd46e48d82.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e17b528f9c192653dc9777bd46e48d82.exepid process 3680 e17b528f9c192653dc9777bd46e48d82.exe 3680 e17b528f9c192653dc9777bd46e48d82.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e17b528f9c192653dc9777bd46e48d82.exedescription pid process target process PID 352 wrote to memory of 3680 352 e17b528f9c192653dc9777bd46e48d82.exe e17b528f9c192653dc9777bd46e48d82.exe PID 352 wrote to memory of 3680 352 e17b528f9c192653dc9777bd46e48d82.exe e17b528f9c192653dc9777bd46e48d82.exe PID 352 wrote to memory of 3680 352 e17b528f9c192653dc9777bd46e48d82.exe e17b528f9c192653dc9777bd46e48d82.exe PID 352 wrote to memory of 3680 352 e17b528f9c192653dc9777bd46e48d82.exe e17b528f9c192653dc9777bd46e48d82.exe PID 352 wrote to memory of 3680 352 e17b528f9c192653dc9777bd46e48d82.exe e17b528f9c192653dc9777bd46e48d82.exe PID 352 wrote to memory of 3680 352 e17b528f9c192653dc9777bd46e48d82.exe e17b528f9c192653dc9777bd46e48d82.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17b528f9c192653dc9777bd46e48d82.exe"C:\Users\Admin\AppData\Local\Temp\e17b528f9c192653dc9777bd46e48d82.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e17b528f9c192653dc9777bd46e48d82.exe"C:\Users\Admin\AppData\Local\Temp\e17b528f9c192653dc9777bd46e48d82.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/352-115-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/352-117-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/352-118-0x0000000005360000-0x0000000005361000-memory.dmpFilesize
4KB
-
memory/352-119-0x00000000052E0000-0x00000000052E1000-memory.dmpFilesize
4KB
-
memory/352-120-0x0000000005490000-0x0000000005496000-memory.dmpFilesize
24KB
-
memory/352-121-0x0000000005360000-0x000000000585E000-memory.dmpFilesize
5.0MB
-
memory/352-122-0x0000000006100000-0x0000000006101000-memory.dmpFilesize
4KB
-
memory/352-123-0x0000000006060000-0x00000000060B0000-memory.dmpFilesize
320KB
-
memory/3680-124-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3680-125-0x000000000041F120-mapping.dmp
-
memory/3680-126-0x00000000016B0000-0x00000000019D0000-memory.dmpFilesize
3.1MB