Analysis
-
max time kernel
115s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
30-10-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
b87f81920e06301937deb513ff65bf91.exe
Resource
win7-en-20210920
General
-
Target
b87f81920e06301937deb513ff65bf91.exe
-
Size
403KB
-
MD5
b87f81920e06301937deb513ff65bf91
-
SHA1
cbe9ee020d5fad93b49784f6707614804f3f8ce2
-
SHA256
8aa346b87c8d3d53fb5265cd0c04bbd3c8c978b7e1eb7b2e0958c078322d75e9
-
SHA512
edafb5cd221b340ab2b5b9c9a00d087b0a80d35bd9f07c073fc5ffb0eb4f7360f5751fbf04974ce1e94a39d649fbc7c5efd5b5400c2a255e8b9e01e2964eff27
Malware Config
Extracted
formbook
4.1
s18y
http://www.agentpathleurre.space/s18y/
jokes-online.com
dzzdjn.com
lizzieerhardtebnaryepptts.com
interfacehand.xyz
sale-m.site
block-facebook.com
dicasdamadrinha.com
maythewind.com
hasari.net
omnists.com
thevalley-eg.com
rdfj.xyz
szhfcy.com
alkalineage.club
fdf.xyz
absorplus.com
poldolongo.com
badassshirts.club
ferienwohnungenmv.com
bilboondokoak.com
ambrosiaaudio.com
lifeneurologyclub.com
femboys.world
blehmails.com
gametimebg.com
duytienauto.net
owerful.com
amedicalsupplyco.com
americonnlogistics.com
ateamautoglassga.com
clickstool.com
fzdzcnj.com
txtgo.xyz
izassist.com
3bangzhu.com
myesstyle.com
aek181129aek.xyz
daoxinghumaotest.com
jxdg.xyz
restorationculturecon.com
thenaturalnutrient.com
sportsandgames.info
spiderwebinar.net
erqgseidx.com
donutmastermind.com
aidatislemleri-govtr.com
weetsist.com
sunsetschoolportaits.com
exodusguarant.tech
gsnbls.top
huangdashi33.xyz
amazonretoure.net
greathomeinlakewood.com
lenovoidc.com
qiuhenglawfirm.com
surveyorslimited.com
carterscts.com
helmosy.online
bakersfieldlaughingstock.com
as-payjrku.icu
mr-exclusive.com
givepy.info
ifvita.com
obesocarpinteria.online
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/760-127-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/760-128-0x000000000041F120-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b87f81920e06301937deb513ff65bf91.exedescription pid process target process PID 3772 set thread context of 760 3772 b87f81920e06301937deb513ff65bf91.exe b87f81920e06301937deb513ff65bf91.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b87f81920e06301937deb513ff65bf91.exepid process 760 b87f81920e06301937deb513ff65bf91.exe 760 b87f81920e06301937deb513ff65bf91.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b87f81920e06301937deb513ff65bf91.exedescription pid process target process PID 3772 wrote to memory of 760 3772 b87f81920e06301937deb513ff65bf91.exe b87f81920e06301937deb513ff65bf91.exe PID 3772 wrote to memory of 760 3772 b87f81920e06301937deb513ff65bf91.exe b87f81920e06301937deb513ff65bf91.exe PID 3772 wrote to memory of 760 3772 b87f81920e06301937deb513ff65bf91.exe b87f81920e06301937deb513ff65bf91.exe PID 3772 wrote to memory of 760 3772 b87f81920e06301937deb513ff65bf91.exe b87f81920e06301937deb513ff65bf91.exe PID 3772 wrote to memory of 760 3772 b87f81920e06301937deb513ff65bf91.exe b87f81920e06301937deb513ff65bf91.exe PID 3772 wrote to memory of 760 3772 b87f81920e06301937deb513ff65bf91.exe b87f81920e06301937deb513ff65bf91.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87f81920e06301937deb513ff65bf91.exe"C:\Users\Admin\AppData\Local\Temp\b87f81920e06301937deb513ff65bf91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\b87f81920e06301937deb513ff65bf91.exe"C:\Users\Admin\AppData\Local\Temp\b87f81920e06301937deb513ff65bf91.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/760-127-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/760-128-0x000000000041F120-mapping.dmp
-
memory/760-129-0x0000000001310000-0x0000000001630000-memory.dmpFilesize
3.1MB
-
memory/3772-118-0x0000000000C40000-0x0000000000C41000-memory.dmpFilesize
4KB
-
memory/3772-120-0x0000000005980000-0x0000000005981000-memory.dmpFilesize
4KB
-
memory/3772-121-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/3772-122-0x0000000005480000-0x000000000597E000-memory.dmpFilesize
5.0MB
-
memory/3772-123-0x00000000057A0000-0x00000000057A1000-memory.dmpFilesize
4KB
-
memory/3772-124-0x0000000008A50000-0x0000000008A56000-memory.dmpFilesize
24KB
-
memory/3772-125-0x0000000008D80000-0x0000000008D81000-memory.dmpFilesize
4KB
-
memory/3772-126-0x0000000008F20000-0x0000000008F70000-memory.dmpFilesize
320KB