Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 13:32
Static task
static1
General
-
Target
0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe
-
Size
408KB
-
MD5
6e7eb23ed6f49f777c799e851872e00a
-
SHA1
f1a1b891df9ad7850160459493f467534065e150
-
SHA256
0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285
-
SHA512
fcf32c873bfd8a32b985b671fb94f582dc2562cb59cc7bd20ce6523924958e8e191dbc53fb2c61af36c7f211e0df6c4dcdda04fd0e8a3ea33dc14f263df14b5b
Malware Config
Extracted
formbook
4.1
fezu
palisadeshiking.com
lusteror.com
blogmisaficiones.com
firstprinciplesteam.com
theindoorfarmer.info
sddn55.xyz
womensclothingonlineshop.com
amourneim.com
getlumichargeserver.com
mynegociodev.com
xn--riq159j.com
the-social-hub.com
buypremiumvpn.xyz
brightnes.info
catmanshopper.com
michellepalacdesigns.com
moveventurecapital.com
nzhzygba.com
papahungry.com
electric-classic-bike.com
kathryte.online
problemasconelperro.com
harpo-solutions.com
get300cvamoscampagins.net
estabuloburgers.com
nextgenanalyst.info
e-globalschool.com
jayashkesri.com
goldenbearlumber.com
mkhygien.com
auctionwisdom.com
excelsiornotaryfl.com
bundesfinanzeministerium-de.com
financialservicesforyou.com
pyjama-france.com
atlascustomcreations.com
ban-clicks.com
springmassagealexandria.com
assessoriatrie.com
vnethotspot.online
anabrening.com
bestofpompanobeach.net
hewhorunswithscissors.com
18130072012.com
swishoral.com
hussjekk.online
bcw.today
serenderserenity.com
waculba.com
yz1866.com
xn--v69az2lp0m6hebte8i.com
rolfeichelmann.com
unwaiting.com
itechmoniter.com
orlandoapartmentguide.com
lesakdhj5.com
xn--jkrx19do7i5xoz3d.asia
charcutrements.com
stoneridge.properties
bestshapeketo.com
njdlxdc.com
renotechllc.net
wasjesusmarried.net
karandrin.com
ferasan.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3748-123-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exedescription pid process target process PID 3620 set thread context of 3748 3620 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exepid process 3748 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 3748 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exedescription pid process target process PID 3620 wrote to memory of 3748 3620 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe PID 3620 wrote to memory of 3748 3620 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe PID 3620 wrote to memory of 3748 3620 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe PID 3620 wrote to memory of 3748 3620 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe PID 3620 wrote to memory of 3748 3620 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe PID 3620 wrote to memory of 3748 3620 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe 0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe"C:\Users\Admin\AppData\Local\Temp\0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe"C:\Users\Admin\AppData\Local\Temp\0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3620-115-0x0000000000D70000-0x0000000000DDC000-memory.dmpFilesize
432KB
-
memory/3620-116-0x0000000005C80000-0x000000000617E000-memory.dmpFilesize
5.0MB
-
memory/3620-117-0x0000000005780000-0x0000000005812000-memory.dmpFilesize
584KB
-
memory/3620-118-0x0000000005780000-0x0000000005C7E000-memory.dmpFilesize
5.0MB
-
memory/3620-119-0x0000000005750000-0x000000000575A000-memory.dmpFilesize
40KB
-
memory/3620-120-0x0000000005990000-0x000000000599C000-memory.dmpFilesize
48KB
-
memory/3620-121-0x0000000007EA0000-0x0000000007F3C000-memory.dmpFilesize
624KB
-
memory/3620-122-0x0000000008030000-0x000000000809A000-memory.dmpFilesize
424KB
-
memory/3748-123-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3748-124-0x0000000001390000-0x00000000016B0000-memory.dmpFilesize
3.1MB