Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
25-11-2021 19:22
Static task
static1
Behavioral task
behavioral1
Sample
075bd1e3e3e0c01794ee6a84be2c585a.exe
Resource
win7-en-20211104
General
-
Target
075bd1e3e3e0c01794ee6a84be2c585a.exe
-
Size
722KB
-
MD5
075bd1e3e3e0c01794ee6a84be2c585a
-
SHA1
984a18333bcd137d00a2223a10b83946f0b3949d
-
SHA256
42173f59707de5929c3bc6cd37d5e0dc55d990bce2c29aa6deac6e86c3eec250
-
SHA512
d00a949f26740996d4da000abc5b5241d812d3c7d1a1d0a92863a11f825b79333f20b4105bb2eaad67472f1229e35bd6e056a27be5c4418d639d18aeed3fc676
Malware Config
Extracted
formbook
4.1
9gr5
http://www.cuteprofessionalscrubs.com/9gr5/
newleafcosmetix.com
richermanscastle.com
ru-remonton.com
2diandongche.com
federaldados.design
jeffreycookweb.com
facecs.online
xmeclarn.xyz
olgasmith.xyz
sneakersonlinesale.com
playboyshiba.com
angelamiglioli.com
diitaldefynd.com
whenevergames.com
mtheartcustom.com
vitalactivesupply.com
twistblogr.com
xn--i8s140at3d6u7c.tel
baudelaireelhakim.com
real-estate-miami-searcher.site
131122.xyz
meta-medial.com
carvanaworkers.com
mimamincloor.com
aglutinarteshop.com
portal-arch.com
mandeide.com
golfteesy.com
carteretcancer.center
cuansamping.com
jhhnet.com
oetthalr.xyz
toesonly.com
ctbizmag.com
searchonzippy.com
plantedapts.com
matoneg.online
takened.xyz
meta4.life
africanizedfund.com
jukeboxjason.com
folez.online
troddu.com
802135.com
guiamat.net
gladiasol.com
meditationandyogacentre.com
metaverserealestateagent.com
boogyverse.net
melissa-mochafest.com
cozsweeps.com
pickles-child.com
metaversemediaschool.com
ahfyfz.com
ses-coating.com
pozada.biz
loldollmagic.com
mountfrenchlodge.net
25680125.xyz
inusuklearning.com
dnteagcud.xyz
yupan.site
acloud123.xyz
asadosdonchorizo.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4456-128-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4456-129-0x000000000041F180-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
075bd1e3e3e0c01794ee6a84be2c585a.exedescription pid process target process PID 4276 set thread context of 4456 4276 075bd1e3e3e0c01794ee6a84be2c585a.exe 075bd1e3e3e0c01794ee6a84be2c585a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
075bd1e3e3e0c01794ee6a84be2c585a.exepid process 4456 075bd1e3e3e0c01794ee6a84be2c585a.exe 4456 075bd1e3e3e0c01794ee6a84be2c585a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
075bd1e3e3e0c01794ee6a84be2c585a.exedescription pid process target process PID 4276 wrote to memory of 4456 4276 075bd1e3e3e0c01794ee6a84be2c585a.exe 075bd1e3e3e0c01794ee6a84be2c585a.exe PID 4276 wrote to memory of 4456 4276 075bd1e3e3e0c01794ee6a84be2c585a.exe 075bd1e3e3e0c01794ee6a84be2c585a.exe PID 4276 wrote to memory of 4456 4276 075bd1e3e3e0c01794ee6a84be2c585a.exe 075bd1e3e3e0c01794ee6a84be2c585a.exe PID 4276 wrote to memory of 4456 4276 075bd1e3e3e0c01794ee6a84be2c585a.exe 075bd1e3e3e0c01794ee6a84be2c585a.exe PID 4276 wrote to memory of 4456 4276 075bd1e3e3e0c01794ee6a84be2c585a.exe 075bd1e3e3e0c01794ee6a84be2c585a.exe PID 4276 wrote to memory of 4456 4276 075bd1e3e3e0c01794ee6a84be2c585a.exe 075bd1e3e3e0c01794ee6a84be2c585a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\075bd1e3e3e0c01794ee6a84be2c585a.exe"C:\Users\Admin\AppData\Local\Temp\075bd1e3e3e0c01794ee6a84be2c585a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\075bd1e3e3e0c01794ee6a84be2c585a.exe"C:\Users\Admin\AppData\Local\Temp\075bd1e3e3e0c01794ee6a84be2c585a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4276-118-0x0000000000FA0000-0x0000000000FA1000-memory.dmpFilesize
4KB
-
memory/4276-120-0x0000000005E80000-0x0000000005E81000-memory.dmpFilesize
4KB
-
memory/4276-121-0x0000000005890000-0x0000000005891000-memory.dmpFilesize
4KB
-
memory/4276-122-0x0000000005980000-0x0000000005E7E000-memory.dmpFilesize
5.0MB
-
memory/4276-123-0x0000000005940000-0x0000000005941000-memory.dmpFilesize
4KB
-
memory/4276-124-0x0000000005960000-0x0000000005968000-memory.dmpFilesize
32KB
-
memory/4276-125-0x0000000005BE0000-0x0000000005BE1000-memory.dmpFilesize
4KB
-
memory/4276-126-0x0000000006680000-0x0000000006681000-memory.dmpFilesize
4KB
-
memory/4276-127-0x0000000006820000-0x00000000068A0000-memory.dmpFilesize
512KB
-
memory/4456-128-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4456-129-0x000000000041F180-mapping.dmp
-
memory/4456-130-0x0000000000F00000-0x0000000001220000-memory.dmpFilesize
3.1MB