Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
20-12-2021 15:08
Static task
static1
General
-
Target
bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe
-
Size
478KB
-
MD5
a6994db9af566c6bf180e5738ed966a1
-
SHA1
db179124a5dc6891377d29a796adc8fc32893c20
-
SHA256
bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38
-
SHA512
1d41face28500234db165ae4a87289c17dcdab5fd67a7345619dd5f3d8024ad03e2d02186e28bf7357ad0c1fb05425c879204ea8b9ec3b5b1ca4512ee981f2c6
Malware Config
Extracted
formbook
4.1
a83r
comercializadoralonso.com
durhamschoolservces.com
onegreencapital.com
smartcities24.com
maquinas.store
brianlovesbonsai.com
xin41518s.com
moneyearnus.xyz
be-mix.com
fengyat.club
inspectdecided.xyz
paksafpakistan.com
orhidlnt.top
princesuraj.com
vietnamvodka.com
renewnow.site
imageservices.xyz
luxurytravelfranchise.com
kp112.red
royalyorkfirewood.com
azharrizvi.com
mtvamazon.com
stlouisplatinumhomes.com
ke6rkmtn.xyz
roomviser.xyz
rollcalloutfitters.com
jlautoparts.net
swipyy.xyz
handymansaltlakecity.com
tuespr.com
prelink.xyz
whrpky037.xyz
yoga-4-health.com
silvermoonandcompany.com
meg-roh.com
81218121.com
prayerteamusa.com
ocejxu.com
lopeyhomeimporvementservice.com
dcosearchandconnect.xyz
md-newspages.online
elinmex.online
traineriq.com
feministecologies.com
gyltogether.com
polyversed.com
rodolforios.com
bcfs0l.com
51dmm.com
metaverselivecasinos.com
csjsgk.com
impactincentivesregistry.com
firekim.space
jdzn.xyz
d6ybf7yj.xyz
sturt.xyz
serious-cam.com
stihl-gms.com
gentleman5.xyz
rustbeltcoders.net
hmarketsed96.com
cricfreelive.com
wellyounow.com
fwdrow.com
hstolchsjybyl.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4040-124-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/4040-125-0x000000000041F170-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exedescription pid process target process PID 3056 set thread context of 4040 3056 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exepid process 4040 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe 4040 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exedescription pid process target process PID 3056 wrote to memory of 4040 3056 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe PID 3056 wrote to memory of 4040 3056 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe PID 3056 wrote to memory of 4040 3056 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe PID 3056 wrote to memory of 4040 3056 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe PID 3056 wrote to memory of 4040 3056 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe PID 3056 wrote to memory of 4040 3056 bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe"C:\Users\Admin\AppData\Local\Temp\bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe"C:\Users\Admin\AppData\Local\Temp\bc049a2dd0bd12408af44d221301cc85ed0f46cbe7dc0911e6f8be908f6fce38.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3056-114-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/3056-116-0x0000000005550000-0x0000000005551000-memory.dmpFilesize
4KB
-
memory/3056-117-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/3056-118-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/3056-119-0x0000000005050000-0x000000000554E000-memory.dmpFilesize
5.0MB
-
memory/3056-120-0x0000000008740000-0x0000000008741000-memory.dmpFilesize
4KB
-
memory/3056-121-0x0000000005280000-0x0000000005288000-memory.dmpFilesize
32KB
-
memory/3056-122-0x00000000086A0000-0x00000000086A1000-memory.dmpFilesize
4KB
-
memory/3056-123-0x0000000006D30000-0x0000000006D8F000-memory.dmpFilesize
380KB
-
memory/4040-124-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4040-125-0x000000000041F170-mapping.dmp
-
memory/4040-126-0x0000000001360000-0x0000000001680000-memory.dmpFilesize
3.1MB