Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
16-11-2021 09:35
Static task
static1
Behavioral task
behavioral1
Sample
bd5c3ee098497398ee0f1a08b37923e1.exe
Resource
win7-en-20211014
General
-
Target
bd5c3ee098497398ee0f1a08b37923e1.exe
-
Size
862KB
-
MD5
bd5c3ee098497398ee0f1a08b37923e1
-
SHA1
74f7aa308918769af8cc88c16f59f9a5edfc6704
-
SHA256
c8b86f436d0bdc91763e23126a5ea0da8504ce66196eb73dc3dde8f955af1ea9
-
SHA512
6e35ce1d7de10618ff748be80fe897d4fe6fb9a61237b7ad8b98919d51384ba4ccbfa5eff4a78ecc9dc0e8d22dc1a5fabfb42befa6988fa7e0ea626b7d108898
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1312-64-0x000000000041F150-mapping.dmp formbook behavioral1/memory/1312-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bd5c3ee098497398ee0f1a08b37923e1.exedescription pid process target process PID 1148 set thread context of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bd5c3ee098497398ee0f1a08b37923e1.exepid process 1312 bd5c3ee098497398ee0f1a08b37923e1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
bd5c3ee098497398ee0f1a08b37923e1.exedescription pid process target process PID 1148 wrote to memory of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe PID 1148 wrote to memory of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe PID 1148 wrote to memory of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe PID 1148 wrote to memory of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe PID 1148 wrote to memory of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe PID 1148 wrote to memory of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe PID 1148 wrote to memory of 1312 1148 bd5c3ee098497398ee0f1a08b37923e1.exe bd5c3ee098497398ee0f1a08b37923e1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd5c3ee098497398ee0f1a08b37923e1.exe"C:\Users\Admin\AppData\Local\Temp\bd5c3ee098497398ee0f1a08b37923e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bd5c3ee098497398ee0f1a08b37923e1.exe"C:\Users\Admin\AppData\Local\Temp\bd5c3ee098497398ee0f1a08b37923e1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1148-55-0x0000000001100000-0x0000000001101000-memory.dmpFilesize
4KB
-
memory/1148-57-0x00000000762D1000-0x00000000762D3000-memory.dmpFilesize
8KB
-
memory/1148-58-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/1148-59-0x00000000005C0000-0x00000000005C7000-memory.dmpFilesize
28KB
-
memory/1148-60-0x00000000010B0000-0x00000000010FC000-memory.dmpFilesize
304KB
-
memory/1312-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1312-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1312-64-0x000000000041F150-mapping.dmp
-
memory/1312-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1312-65-0x0000000000930000-0x0000000000C33000-memory.dmpFilesize
3.0MB