Analysis
-
max time kernel
80s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 13:40
Static task
static1
Behavioral task
behavioral1
Sample
ac889675aa282449205f31cd4f46f3d6.exe
Resource
win7-en-20211208
General
-
Target
ac889675aa282449205f31cd4f46f3d6.exe
-
Size
404KB
-
MD5
ac889675aa282449205f31cd4f46f3d6
-
SHA1
50115144e96337ed3bfe27480a82300002310400
-
SHA256
d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e
-
SHA512
3a32641a515063fa9d062fa78a778f5f05088707af2a431904c37a0d772145e02617a172be9a74fe65c64b4b3e3dcca82aedf351ccbc4bb5b22e29a0ad6742dd
Malware Config
Extracted
formbook
4.1
jy93
alexito.space
shitsthebalm.com
margaritavillemelbourne.com
vonahk.xyz
1960lawn.com
augustacrim.com
bancopec.com
batrainingstudio.com
kokofleks.store
w4-form-irs.com
putnamob.com
mickeysmotors.com
8181yd.com
wedmecreation.com
mischianti.com
gskpop.com
douvip303.com
unlimitedlyfestylez.com
originophthalmics.com
oandazx86.xyz
aflambooks.com
woningkeuren.com
qiyepin.com
referto-online.com
philadelphiaguitarnews.com
wilhelmenaagency.com
visionbox.xyz
exmarry.com
obtainfollowers.com
conationcrossing.com
podiatrybroker.com
natistyle.com
livingessencewater.com
highperformancevehicles.com
undangannikahku.xyz
longlakehomesales.com
pridecocapital.com
prolificgraph.com
greatbayhme.com
bestplant.xyz
lesbianparadise.com
tabvern.com
electronix101.com
mhw44.xyz
xn--arbetslivsaktren-ywb.com
starpromocoes.com
123387lx.com
gunwicam.com
christophergallaghermusic.com
hirevirtualexperts.com
sanjivanimart.com
xn--unww24c.xn--czru2d
xolegal.com
rfzjsb.com
aquaflor.online
masterstouchautomotive.com
comptechs2000.com
vgerlay.com
minifootball-promogive.com
newtech25.com
kilthiredirect.com
allinfobd24.com
mengabarkan.online
derva.link
expressingunderst.store
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4328-122-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ac889675aa282449205f31cd4f46f3d6.exedescription pid process target process PID 3500 set thread context of 4328 3500 ac889675aa282449205f31cd4f46f3d6.exe ac889675aa282449205f31cd4f46f3d6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ac889675aa282449205f31cd4f46f3d6.exepid process 4328 ac889675aa282449205f31cd4f46f3d6.exe 4328 ac889675aa282449205f31cd4f46f3d6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ac889675aa282449205f31cd4f46f3d6.exedescription pid process target process PID 3500 wrote to memory of 4328 3500 ac889675aa282449205f31cd4f46f3d6.exe ac889675aa282449205f31cd4f46f3d6.exe PID 3500 wrote to memory of 4328 3500 ac889675aa282449205f31cd4f46f3d6.exe ac889675aa282449205f31cd4f46f3d6.exe PID 3500 wrote to memory of 4328 3500 ac889675aa282449205f31cd4f46f3d6.exe ac889675aa282449205f31cd4f46f3d6.exe PID 3500 wrote to memory of 4328 3500 ac889675aa282449205f31cd4f46f3d6.exe ac889675aa282449205f31cd4f46f3d6.exe PID 3500 wrote to memory of 4328 3500 ac889675aa282449205f31cd4f46f3d6.exe ac889675aa282449205f31cd4f46f3d6.exe PID 3500 wrote to memory of 4328 3500 ac889675aa282449205f31cd4f46f3d6.exe ac889675aa282449205f31cd4f46f3d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac889675aa282449205f31cd4f46f3d6.exe"C:\Users\Admin\AppData\Local\Temp\ac889675aa282449205f31cd4f46f3d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ac889675aa282449205f31cd4f46f3d6.exe"C:\Users\Admin\AppData\Local\Temp\ac889675aa282449205f31cd4f46f3d6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3500-114-0x00000000002D0000-0x000000000033C000-memory.dmpFilesize
432KB
-
memory/3500-115-0x00000000050F0000-0x00000000055EE000-memory.dmpFilesize
5.0MB
-
memory/3500-116-0x0000000004BF0000-0x0000000004C82000-memory.dmpFilesize
584KB
-
memory/3500-117-0x0000000004CE0000-0x0000000004CEA000-memory.dmpFilesize
40KB
-
memory/3500-118-0x0000000004DB0000-0x0000000004DBC000-memory.dmpFilesize
48KB
-
memory/3500-119-0x0000000004AF0000-0x0000000004B82000-memory.dmpFilesize
584KB
-
memory/3500-120-0x0000000006F80000-0x000000000701C000-memory.dmpFilesize
624KB
-
memory/3500-121-0x00000000070C0000-0x000000000712A000-memory.dmpFilesize
424KB
-
memory/4328-122-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4328-123-0x00000000016A0000-0x00000000019C0000-memory.dmpFilesize
3.1MB