Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 18:07
Static task
static1
Behavioral task
behavioral1
Sample
d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe
Resource
win7-en-20211208
General
-
Target
d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe
-
Size
404KB
-
MD5
ac889675aa282449205f31cd4f46f3d6
-
SHA1
50115144e96337ed3bfe27480a82300002310400
-
SHA256
d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e
-
SHA512
3a32641a515063fa9d062fa78a778f5f05088707af2a431904c37a0d772145e02617a172be9a74fe65c64b4b3e3dcca82aedf351ccbc4bb5b22e29a0ad6742dd
Malware Config
Extracted
formbook
4.1
jy93
alexito.space
shitsthebalm.com
margaritavillemelbourne.com
vonahk.xyz
1960lawn.com
augustacrim.com
bancopec.com
batrainingstudio.com
kokofleks.store
w4-form-irs.com
putnamob.com
mickeysmotors.com
8181yd.com
wedmecreation.com
mischianti.com
gskpop.com
douvip303.com
unlimitedlyfestylez.com
originophthalmics.com
oandazx86.xyz
aflambooks.com
woningkeuren.com
qiyepin.com
referto-online.com
philadelphiaguitarnews.com
wilhelmenaagency.com
visionbox.xyz
exmarry.com
obtainfollowers.com
conationcrossing.com
podiatrybroker.com
natistyle.com
livingessencewater.com
highperformancevehicles.com
undangannikahku.xyz
longlakehomesales.com
pridecocapital.com
prolificgraph.com
greatbayhme.com
bestplant.xyz
lesbianparadise.com
tabvern.com
electronix101.com
mhw44.xyz
xn--arbetslivsaktren-ywb.com
starpromocoes.com
123387lx.com
gunwicam.com
christophergallaghermusic.com
hirevirtualexperts.com
sanjivanimart.com
xn--unww24c.xn--czru2d
xolegal.com
rfzjsb.com
aquaflor.online
masterstouchautomotive.com
comptechs2000.com
vgerlay.com
minifootball-promogive.com
newtech25.com
kilthiredirect.com
allinfobd24.com
mengabarkan.online
derva.link
expressingunderst.store
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1828-61-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exedescription pid process target process PID 1308 set thread context of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exepid process 1828 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exedescription pid process target process PID 1308 wrote to memory of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe PID 1308 wrote to memory of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe PID 1308 wrote to memory of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe PID 1308 wrote to memory of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe PID 1308 wrote to memory of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe PID 1308 wrote to memory of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe PID 1308 wrote to memory of 1828 1308 d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe"C:\Users\Admin\AppData\Local\Temp\d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe"C:\Users\Admin\AppData\Local\Temp\d1eddd348ee11e3da00c9f45fa1fb94e3b174c8abe780a7d764bd22f62980e8e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1308-54-0x0000000000120000-0x000000000018C000-memory.dmpFilesize
432KB
-
memory/1308-55-0x0000000076071000-0x0000000076073000-memory.dmpFilesize
8KB
-
memory/1308-56-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/1308-57-0x00000000004E0000-0x00000000004EC000-memory.dmpFilesize
48KB
-
memory/1308-58-0x00000000050A0000-0x000000000510A000-memory.dmpFilesize
424KB
-
memory/1828-59-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1828-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1828-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1828-62-0x0000000000820000-0x0000000000B23000-memory.dmpFilesize
3.0MB