Analysis
-
max time kernel
120s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 00:14
Static task
static1
General
-
Target
1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe
-
Size
398KB
-
MD5
f6eaacd1b39028130602ee0892e67663
-
SHA1
12ba0b4e8c41ececa29814f9b64da351e5509fb0
-
SHA256
1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d
-
SHA512
a5705ae52ffde84bbd90d6335f23ffccaccbde9b2e75d2462216662a60cf6a178a6a7f2b318975fd77d05ffc1746c357fc85c717fa2aa20cb480e452e9c5463b
Malware Config
Extracted
formbook
4.1
a83r
comercializadoralonso.com
durhamschoolservces.com
onegreencapital.com
smartcities24.com
maquinas.store
brianlovesbonsai.com
xin41518s.com
moneyearnus.xyz
be-mix.com
fengyat.club
inspectdecided.xyz
paksafpakistan.com
orhidlnt.top
princesuraj.com
vietnamvodka.com
renewnow.site
imageservices.xyz
luxurytravelfranchise.com
kp112.red
royalyorkfirewood.com
azharrizvi.com
mtvamazon.com
stlouisplatinumhomes.com
ke6rkmtn.xyz
roomviser.xyz
rollcalloutfitters.com
jlautoparts.net
swipyy.xyz
handymansaltlakecity.com
tuespr.com
prelink.xyz
whrpky037.xyz
yoga-4-health.com
silvermoonandcompany.com
meg-roh.com
81218121.com
prayerteamusa.com
ocejxu.com
lopeyhomeimporvementservice.com
dcosearchandconnect.xyz
md-newspages.online
elinmex.online
traineriq.com
feministecologies.com
gyltogether.com
polyversed.com
rodolforios.com
bcfs0l.com
51dmm.com
metaverselivecasinos.com
csjsgk.com
impactincentivesregistry.com
firekim.space
jdzn.xyz
d6ybf7yj.xyz
sturt.xyz
serious-cam.com
stihl-gms.com
gentleman5.xyz
rustbeltcoders.net
hmarketsed96.com
cricfreelive.com
wellyounow.com
fwdrow.com
hstolchsjybyl.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3240-126-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exedescription pid process target process PID 2500 set thread context of 3240 2500 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exepid process 3240 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 3240 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exedescription pid process target process PID 2500 wrote to memory of 3240 2500 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe PID 2500 wrote to memory of 3240 2500 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe PID 2500 wrote to memory of 3240 2500 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe PID 2500 wrote to memory of 3240 2500 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe PID 2500 wrote to memory of 3240 2500 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe PID 2500 wrote to memory of 3240 2500 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe 1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe"C:\Users\Admin\AppData\Local\Temp\1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe"C:\Users\Admin\AppData\Local\Temp\1e144fefc15a6a2643674f01b3324e29b5320d45a16a081e8aad8a969712cb9d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2500-118-0x0000000000D90000-0x0000000000DFA000-memory.dmpFilesize
424KB
-
memory/2500-119-0x0000000005A90000-0x0000000005F8E000-memory.dmpFilesize
5.0MB
-
memory/2500-120-0x0000000005630000-0x00000000056C2000-memory.dmpFilesize
584KB
-
memory/2500-121-0x0000000005590000-0x0000000005A8E000-memory.dmpFilesize
5.0MB
-
memory/2500-122-0x00000000057A0000-0x00000000057AA000-memory.dmpFilesize
40KB
-
memory/2500-123-0x00000000079E0000-0x00000000079EC000-memory.dmpFilesize
48KB
-
memory/2500-124-0x0000000007D20000-0x0000000007DBC000-memory.dmpFilesize
624KB
-
memory/2500-125-0x0000000007FE0000-0x000000000804A000-memory.dmpFilesize
424KB
-
memory/3240-126-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3240-127-0x0000000001090000-0x00000000013B0000-memory.dmpFilesize
3.1MB