Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
01-11-2021 09:42
Static task
static1
Behavioral task
behavioral1
Sample
ee8cc08d22bc6541b19e4b435b341ced.exe
Resource
win7-en-20210920
General
-
Target
ee8cc08d22bc6541b19e4b435b341ced.exe
-
Size
559KB
-
MD5
ee8cc08d22bc6541b19e4b435b341ced
-
SHA1
14eef8604298dd707b6b6d40c428b176359ea686
-
SHA256
fcd3b620d09a3268b7d58c23a46aaa8446c13e045ad99cf5c71eb2d811f3a61f
-
SHA512
7a4ca5e3fc02cd3fc2ce1ec487d00408794fed6f5def10171e6e094ba95637c0594fc1899ab73122776b58b6dad2898b68cc5224a39a2cf67c70313fe5c89b4d
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1904-124-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1904-125-0x000000000041F150-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ee8cc08d22bc6541b19e4b435b341ced.exedescription pid process target process PID 3812 set thread context of 1904 3812 ee8cc08d22bc6541b19e4b435b341ced.exe ee8cc08d22bc6541b19e4b435b341ced.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ee8cc08d22bc6541b19e4b435b341ced.exepid process 1904 ee8cc08d22bc6541b19e4b435b341ced.exe 1904 ee8cc08d22bc6541b19e4b435b341ced.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ee8cc08d22bc6541b19e4b435b341ced.exedescription pid process target process PID 3812 wrote to memory of 1904 3812 ee8cc08d22bc6541b19e4b435b341ced.exe ee8cc08d22bc6541b19e4b435b341ced.exe PID 3812 wrote to memory of 1904 3812 ee8cc08d22bc6541b19e4b435b341ced.exe ee8cc08d22bc6541b19e4b435b341ced.exe PID 3812 wrote to memory of 1904 3812 ee8cc08d22bc6541b19e4b435b341ced.exe ee8cc08d22bc6541b19e4b435b341ced.exe PID 3812 wrote to memory of 1904 3812 ee8cc08d22bc6541b19e4b435b341ced.exe ee8cc08d22bc6541b19e4b435b341ced.exe PID 3812 wrote to memory of 1904 3812 ee8cc08d22bc6541b19e4b435b341ced.exe ee8cc08d22bc6541b19e4b435b341ced.exe PID 3812 wrote to memory of 1904 3812 ee8cc08d22bc6541b19e4b435b341ced.exe ee8cc08d22bc6541b19e4b435b341ced.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8cc08d22bc6541b19e4b435b341ced.exe"C:\Users\Admin\AppData\Local\Temp\ee8cc08d22bc6541b19e4b435b341ced.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ee8cc08d22bc6541b19e4b435b341ced.exe"C:\Users\Admin\AppData\Local\Temp\ee8cc08d22bc6541b19e4b435b341ced.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-124-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1904-125-0x000000000041F150-mapping.dmp
-
memory/1904-126-0x00000000019B0000-0x0000000001CD0000-memory.dmpFilesize
3.1MB
-
memory/3812-115-0x00000000009A0000-0x00000000009A1000-memory.dmpFilesize
4KB
-
memory/3812-117-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/3812-118-0x00000000053E0000-0x00000000053E1000-memory.dmpFilesize
4KB
-
memory/3812-119-0x0000000005340000-0x000000000583E000-memory.dmpFilesize
5.0MB
-
memory/3812-120-0x00000000053D0000-0x00000000053D1000-memory.dmpFilesize
4KB
-
memory/3812-121-0x0000000005730000-0x0000000005737000-memory.dmpFilesize
28KB
-
memory/3812-122-0x0000000008C80000-0x0000000008C81000-memory.dmpFilesize
4KB
-
memory/3812-123-0x0000000008E20000-0x0000000008E72000-memory.dmpFilesize
328KB