Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe
Resource
win7-en-20211208
General
-
Target
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe
-
Size
711KB
-
MD5
28996f9f1e4b645eed15f6bc8b51d937
-
SHA1
190bec54bcc632a8d676ff9df2b4bcec455c25fc
-
SHA256
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37
-
SHA512
63a43eb9e28a869d0af32b745e61f39b429179af988592f98dec6e2175a013a442b4e1f1b21fa5ef378f92e9849c62c4dc7e21f169b745000f2bdc603abe1599
Malware Config
Extracted
formbook
3.9
ge
basakpentamir.com
pilgrimbaits-premium.com
ab5pp.com
fjtts.com
stpelectronics.com
foraol.com
protagonista.info
nigeriasno1datingsite.com
dignity.live
bodyworldholdings.com
01lover.com
wwwjinsha045.com
serverlan.info
themachinevspeople.info
bergencountyautosales.com
hillsidemanor.house
sergiypavlyukphoto.com
abetterforupgrades.date
lokireddygroup.com
il-hotels-review.com
stone-interieur.com
sistemasucma.com
intersectventures.com
westonnissannw.info
vercour-mezo.com
oceanclub1.com
galexmulti.com
aajkapakistan.com
towzoom.com
krcgf.info
com-lphone.info
overcold.com
5008123.com
jbxdev.com
cozero.com
lifeforhealth74.com
revolicthailand.com
chungcu-paragontower.net
blink-boutique.com
pst-pure.energy
2ndwind.info
newyorkartbeat.net
xn--2qux23cg7bq62b.com
withdrawfromroute.com
archeractuarial.com
brianreynaphoto.com
calliluggage.com
xn--zoom-9j3po85on3dfpf.com
kf575.com
odv.asia
gaziantepulucanlarasm.com
ynhuiniu.com
betingirnavad90.com
substitutionshelp.accountant
ekvpres.com
letsgooba.com
lbdaycarecenter.com
beehappyplanting.com
zhaozushou.com
ronaqalamerat.com
softball.place
iccampionihotel.com
prashiru.com
coterielancaster.net
menflax.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1288-56-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exedescription pid process target process PID 1564 set thread context of 1288 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exepid process 1288 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exepid process 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exepid process 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exedescription pid process target process PID 1564 wrote to memory of 1288 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 1564 wrote to memory of 1288 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 1564 wrote to memory of 1288 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 1564 wrote to memory of 1288 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 1564 wrote to memory of 1288 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 1564 wrote to memory of 1288 1564 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"2⤵
- Suspicious behavior: EnumeratesProcesses