Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 13:39
Static task
static1
Behavioral task
behavioral1
Sample
6e7eb23ed6f49f777c799e851872e00a.exe
Resource
win7-en-20211208
General
-
Target
6e7eb23ed6f49f777c799e851872e00a.exe
-
Size
408KB
-
MD5
6e7eb23ed6f49f777c799e851872e00a
-
SHA1
f1a1b891df9ad7850160459493f467534065e150
-
SHA256
0be852dc052384c403f96e94c0f681c8d4b2429dbb413f9abe896e39f5cb7285
-
SHA512
fcf32c873bfd8a32b985b671fb94f582dc2562cb59cc7bd20ce6523924958e8e191dbc53fb2c61af36c7f211e0df6c4dcdda04fd0e8a3ea33dc14f263df14b5b
Malware Config
Extracted
formbook
4.1
fezu
palisadeshiking.com
lusteror.com
blogmisaficiones.com
firstprinciplesteam.com
theindoorfarmer.info
sddn55.xyz
womensclothingonlineshop.com
amourneim.com
getlumichargeserver.com
mynegociodev.com
xn--riq159j.com
the-social-hub.com
buypremiumvpn.xyz
brightnes.info
catmanshopper.com
michellepalacdesigns.com
moveventurecapital.com
nzhzygba.com
papahungry.com
electric-classic-bike.com
kathryte.online
problemasconelperro.com
harpo-solutions.com
get300cvamoscampagins.net
estabuloburgers.com
nextgenanalyst.info
e-globalschool.com
jayashkesri.com
goldenbearlumber.com
mkhygien.com
auctionwisdom.com
excelsiornotaryfl.com
bundesfinanzeministerium-de.com
financialservicesforyou.com
pyjama-france.com
atlascustomcreations.com
ban-clicks.com
springmassagealexandria.com
assessoriatrie.com
vnethotspot.online
anabrening.com
bestofpompanobeach.net
hewhorunswithscissors.com
18130072012.com
swishoral.com
hussjekk.online
bcw.today
serenderserenity.com
waculba.com
yz1866.com
xn--v69az2lp0m6hebte8i.com
rolfeichelmann.com
unwaiting.com
itechmoniter.com
orlandoapartmentguide.com
lesakdhj5.com
xn--jkrx19do7i5xoz3d.asia
charcutrements.com
stoneridge.properties
bestshapeketo.com
njdlxdc.com
renotechllc.net
wasjesusmarried.net
karandrin.com
ferasan.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6e7eb23ed6f49f777c799e851872e00a.exedescription pid process target process PID 1108 set thread context of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6e7eb23ed6f49f777c799e851872e00a.exe6e7eb23ed6f49f777c799e851872e00a.exepid process 1108 6e7eb23ed6f49f777c799e851872e00a.exe 2036 6e7eb23ed6f49f777c799e851872e00a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6e7eb23ed6f49f777c799e851872e00a.exedescription pid process Token: SeDebugPrivilege 1108 6e7eb23ed6f49f777c799e851872e00a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
6e7eb23ed6f49f777c799e851872e00a.exedescription pid process target process PID 1108 wrote to memory of 1568 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 1568 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 1568 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 1568 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe PID 1108 wrote to memory of 2036 1108 6e7eb23ed6f49f777c799e851872e00a.exe 6e7eb23ed6f49f777c799e851872e00a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e7eb23ed6f49f777c799e851872e00a.exe"C:\Users\Admin\AppData\Local\Temp\6e7eb23ed6f49f777c799e851872e00a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6e7eb23ed6f49f777c799e851872e00a.exe"C:\Users\Admin\AppData\Local\Temp\6e7eb23ed6f49f777c799e851872e00a.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\6e7eb23ed6f49f777c799e851872e00a.exe"C:\Users\Admin\AppData\Local\Temp\6e7eb23ed6f49f777c799e851872e00a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1108-55-0x0000000000950000-0x00000000009BC000-memory.dmpFilesize
432KB
-
memory/1108-56-0x0000000075421000-0x0000000075423000-memory.dmpFilesize
8KB
-
memory/1108-57-0x0000000004890000-0x0000000004891000-memory.dmpFilesize
4KB
-
memory/1108-58-0x00000000003F0000-0x00000000003FC000-memory.dmpFilesize
48KB
-
memory/1108-59-0x00000000056F0000-0x000000000575A000-memory.dmpFilesize
424KB
-
memory/2036-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2036-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2036-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2036-63-0x0000000000B50000-0x0000000000E53000-memory.dmpFilesize
3.0MB