1ad9efcddab819d24cca2f9323395f9e
1ad9efcddab819d24cca2f9323395f9e.exe
329KB
13-11-2021 10:57
1ad9efcddab819d24cca2f9323395f9e
1ffcdd188cb66666cdac14bb8d8b48902bd666e6
8b249a16ea50d01651cf9c1f01c97deea48293f1b28735450d62bd0413b93653
Extracted
Family | formbook |
Version | 4.1 |
Campaign | kzk9 |
C2 |
http://www.yourmajordomo.com/kzk9/ |
Decoy |
tianconghuo.club 1996-page.com ourtownmax.net conservativetreehose.com synth.repair donnachicacreperia.com tentfull.com weapp.download surfersink.com gattlebusinessservices.com sebastian249.com anhphuc.company betternatureproducts.net defroplate.com seattlesquidsquad.com polarjob.com lendingadvantage.com angelsondope.com goportjitney.com tiendagrupojagr.com self-care360.com foreignexchage.com loan-stalemate.info hrsimrnsingh.com laserobsession.com primetimesmagazine.com teminyulon.xyz kanoondarab.com alpinefall.com tbmautosales.com 4g2020.com libertyquartermaster.com flavorfalafel.com generlitravel.com solvedfp.icu jamnvibez.com zmx258.com doudiangroup.com dancecenterwest.com ryantheeconomist.com beeofthehive.com bluelearn.world vivalasplantas.com yumiacraftlab.com shophere247365.com enjoybespokenwords.com windajol.com ctgbazar.xyz afcerd.com dateprotect.com |
Filter: none
-
Formbook
Description
Formbook is a data stealing malware which is capable of stealing data.
Tags
-
Formbook Payload
Tags
Reported IOCs
resource yara_rule behavioral2/memory/1012-124-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1012-125-0x000000000041EB80-mapping.dmp formbook -
Suspicious use of SetThreadContext1ad9efcddab819d24cca2f9323395f9e.exe
Reported IOCs
description pid process target process PID 2680 set thread context of 1012 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1ad9efcddab819d24cca2f9323395f9e.exe -
Suspicious behavior: EnumeratesProcesses1ad9efcddab819d24cca2f9323395f9e.exe1ad9efcddab819d24cca2f9323395f9e.exe
Reported IOCs
pid process 2680 1ad9efcddab819d24cca2f9323395f9e.exe 2680 1ad9efcddab819d24cca2f9323395f9e.exe 2680 1ad9efcddab819d24cca2f9323395f9e.exe 2680 1ad9efcddab819d24cca2f9323395f9e.exe 2680 1ad9efcddab819d24cca2f9323395f9e.exe 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1012 1ad9efcddab819d24cca2f9323395f9e.exe 1012 1ad9efcddab819d24cca2f9323395f9e.exe -
Suspicious use of AdjustPrivilegeToken1ad9efcddab819d24cca2f9323395f9e.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 2680 1ad9efcddab819d24cca2f9323395f9e.exe -
Suspicious use of WriteProcessMemory1ad9efcddab819d24cca2f9323395f9e.exe
Reported IOCs
description pid process target process PID 2680 wrote to memory of 1012 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1ad9efcddab819d24cca2f9323395f9e.exe PID 2680 wrote to memory of 1012 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1ad9efcddab819d24cca2f9323395f9e.exe PID 2680 wrote to memory of 1012 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1ad9efcddab819d24cca2f9323395f9e.exe PID 2680 wrote to memory of 1012 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1ad9efcddab819d24cca2f9323395f9e.exe PID 2680 wrote to memory of 1012 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1ad9efcddab819d24cca2f9323395f9e.exe PID 2680 wrote to memory of 1012 2680 1ad9efcddab819d24cca2f9323395f9e.exe 1ad9efcddab819d24cca2f9323395f9e.exe
-
C:\Users\Admin\AppData\Local\Temp\1ad9efcddab819d24cca2f9323395f9e.exe"C:\Users\Admin\AppData\Local\Temp\1ad9efcddab819d24cca2f9323395f9e.exe"Suspicious use of SetThreadContextSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1ad9efcddab819d24cca2f9323395f9e.exe"C:\Users\Admin\AppData\Local\Temp\1ad9efcddab819d24cca2f9323395f9e.exe"Suspicious behavior: EnumeratesProcesses
-
memory/1012-124-0x0000000000400000-0x000000000042E000-memory.dmp
-
memory/1012-125-0x000000000041EB80-mapping.dmp
-
memory/1012-126-0x00000000012C0000-0x00000000015E0000-memory.dmp
-
memory/2680-115-0x0000000000210000-0x0000000000211000-memory.dmp
-
memory/2680-117-0x00000000051E0000-0x00000000051E1000-memory.dmp
-
memory/2680-121-0x0000000004F90000-0x0000000004F97000-memory.dmp
-
memory/2680-122-0x0000000007380000-0x0000000007381000-memory.dmp
-
memory/2680-123-0x0000000007420000-0x000000000746B000-memory.dmp
-
memory/2680-118-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
-
memory/2680-119-0x0000000004CE0000-0x00000000051DE000-memory.dmp
-
memory/2680-120-0x0000000004C70000-0x0000000004C71000-memory.dmp