Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
22-11-2021 14:25
Static task
static1
Behavioral task
behavioral1
Sample
fef53bf27227284ba5324f1eb1cca516.exe
Resource
win7-en-20211104
General
-
Target
fef53bf27227284ba5324f1eb1cca516.exe
-
Size
720KB
-
MD5
fef53bf27227284ba5324f1eb1cca516
-
SHA1
759e18dc1467c5df07561185090ba816953f810f
-
SHA256
30c4d8cc68cc16af698b521cf9e31a8540f0c5cce8e2d66e874fc62a87dae393
-
SHA512
a58d1b717db73d30eb2c1f25aabe02535a2bd6d8ef538818320abab84c5e9dcfa2350821e789cdab43d4fce7d703906ac623f7479f83aba7f7a9c73a4cea65ac
Malware Config
Extracted
formbook
4.1
vngb
http://www.gvlc0.club/vngb/
omertalasvegas.com
payyep.com
modasportss.com
gestionestrategicadl.com
teamolemiss.club
geektranslate.com
versatileventure.com
athletic-hub.com
vitanovaretreats.com
padison8t.com
tutoeasy.com
ediblewholesale.com
kangrungao.com
satode.com
prohibitionfeeds.com
getmorevacations.com
blinkworldbeauty.com
kdlabsallr.com
almanasef.com
transportationservicellc.com
goodtime.photos
pkmpresensi.com
banddwoodworks.com
agoodhotel.com
sec-waliet.com
unitybookkeepingsolutions.com
msbyjenny.com
thefilipinostory.com
nez-care.com
jobsforjabless.com
joeyzelinka.com
springeqx.com
doubletreeankamall.com
tribal-treasures.com
kickbikedepot.com
ez.money
norpandco.com
alanavieira.online
studybugger.net
giaohangtietkiemhcm.com
soundlifeonline.com
mindbodyweightlossmethod.com
arcelius.one
executivecenterlacey.com
summergreenarea.com
skydaddy.guru
peblish.com
croworld.tools
99099888.com
48rmz6.biz
globalshadowboards.com
420doggy.com
sikratek.com
pradaexch9.com
fashionbusinessmanagement.com
givemeyouroil.com
recifetopschoolteacher.com
dealhay.net
bitpaa.com
insidersbyio.com
atheanas.com
projectcentered.com
mmj0115.xyz
yektaburgers.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/364-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/364-64-0x000000000041F0E0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fef53bf27227284ba5324f1eb1cca516.exedescription pid process target process PID 1504 set thread context of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fef53bf27227284ba5324f1eb1cca516.exefef53bf27227284ba5324f1eb1cca516.exepid process 1504 fef53bf27227284ba5324f1eb1cca516.exe 364 fef53bf27227284ba5324f1eb1cca516.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fef53bf27227284ba5324f1eb1cca516.exedescription pid process Token: SeDebugPrivilege 1504 fef53bf27227284ba5324f1eb1cca516.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fef53bf27227284ba5324f1eb1cca516.exedescription pid process target process PID 1504 wrote to memory of 1364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 1364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 1364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 1364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe PID 1504 wrote to memory of 364 1504 fef53bf27227284ba5324f1eb1cca516.exe fef53bf27227284ba5324f1eb1cca516.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef53bf27227284ba5324f1eb1cca516.exe"C:\Users\Admin\AppData\Local\Temp\fef53bf27227284ba5324f1eb1cca516.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fef53bf27227284ba5324f1eb1cca516.exe"C:\Users\Admin\AppData\Local\Temp\fef53bf27227284ba5324f1eb1cca516.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\fef53bf27227284ba5324f1eb1cca516.exe"C:\Users\Admin\AppData\Local\Temp\fef53bf27227284ba5324f1eb1cca516.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/364-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/364-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/364-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/364-64-0x000000000041F0E0-mapping.dmp
-
memory/364-65-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB
-
memory/1504-55-0x0000000010D50000-0x0000000010D51000-memory.dmpFilesize
4KB
-
memory/1504-57-0x0000000075141000-0x0000000075143000-memory.dmpFilesize
8KB
-
memory/1504-58-0x00000000041D0000-0x00000000041D1000-memory.dmpFilesize
4KB
-
memory/1504-59-0x0000000000510000-0x0000000000514000-memory.dmpFilesize
16KB
-
memory/1504-60-0x0000000004170000-0x00000000041D0000-memory.dmpFilesize
384KB