Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
29-11-2021 21:46
Static task
static1
General
-
Target
882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe
-
Size
502KB
-
MD5
e96932ebdf43aba69c5cdcebc89413cb
-
SHA1
5051ceeb14e13c31f64df10844b65fea185caf44
-
SHA256
882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8
-
SHA512
6cb93514c2d240de42a321bdd579b34091b65e6615b23924602e7168b9ac2f3a32c146d415832c2d98d9ad1b4367a829e5ebc2c0c4e862f361b54de5edcc055a
Malware Config
Extracted
formbook
4.1
vngb
http://www.gvlc0.club/vngb/
omertalasvegas.com
payyep.com
modasportss.com
gestionestrategicadl.com
teamolemiss.club
geektranslate.com
versatileventure.com
athletic-hub.com
vitanovaretreats.com
padison8t.com
tutoeasy.com
ediblewholesale.com
kangrungao.com
satode.com
prohibitionfeeds.com
getmorevacations.com
blinkworldbeauty.com
kdlabsallr.com
almanasef.com
transportationservicellc.com
goodtime.photos
pkmpresensi.com
banddwoodworks.com
agoodhotel.com
sec-waliet.com
unitybookkeepingsolutions.com
msbyjenny.com
thefilipinostory.com
nez-care.com
jobsforjabless.com
joeyzelinka.com
springeqx.com
doubletreeankamall.com
tribal-treasures.com
kickbikedepot.com
ez.money
norpandco.com
alanavieira.online
studybugger.net
giaohangtietkiemhcm.com
soundlifeonline.com
mindbodyweightlossmethod.com
arcelius.one
executivecenterlacey.com
summergreenarea.com
skydaddy.guru
peblish.com
croworld.tools
99099888.com
48rmz6.biz
globalshadowboards.com
420doggy.com
sikratek.com
pradaexch9.com
fashionbusinessmanagement.com
givemeyouroil.com
recifetopschoolteacher.com
dealhay.net
bitpaa.com
insidersbyio.com
atheanas.com
projectcentered.com
mmj0115.xyz
yektaburgers.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4312-126-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/4312-127-0x000000000041F0E0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exedescription pid process target process PID 3612 set thread context of 4312 3612 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exepid process 4312 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 4312 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exedescription pid process target process PID 3612 wrote to memory of 4312 3612 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe PID 3612 wrote to memory of 4312 3612 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe PID 3612 wrote to memory of 4312 3612 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe PID 3612 wrote to memory of 4312 3612 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe PID 3612 wrote to memory of 4312 3612 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe PID 3612 wrote to memory of 4312 3612 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe 882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe"C:\Users\Admin\AppData\Local\Temp\882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe"C:\Users\Admin\AppData\Local\Temp\882d1b405632e01ab063253e2a0f647ff2587fe879e6b90e03b59226e36c8fe8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3612-118-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/3612-120-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/3612-121-0x0000000005850000-0x0000000005851000-memory.dmpFilesize
4KB
-
memory/3612-122-0x0000000005820000-0x0000000005826000-memory.dmpFilesize
24KB
-
memory/3612-123-0x0000000005ED0000-0x0000000005ED1000-memory.dmpFilesize
4KB
-
memory/3612-124-0x0000000006170000-0x00000000061D0000-memory.dmpFilesize
384KB
-
memory/3612-125-0x00000000066D0000-0x00000000066D1000-memory.dmpFilesize
4KB
-
memory/4312-126-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4312-127-0x000000000041F0E0-mapping.dmp
-
memory/4312-128-0x00000000014B0000-0x00000000017D0000-memory.dmpFilesize
3.1MB