Analysis
-
max time kernel
125s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe
Resource
win7-en-20211208
General
-
Target
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe
-
Size
711KB
-
MD5
28996f9f1e4b645eed15f6bc8b51d937
-
SHA1
190bec54bcc632a8d676ff9df2b4bcec455c25fc
-
SHA256
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37
-
SHA512
63a43eb9e28a869d0af32b745e61f39b429179af988592f98dec6e2175a013a442b4e1f1b21fa5ef378f92e9849c62c4dc7e21f169b745000f2bdc603abe1599
Malware Config
Extracted
formbook
3.9
ge
basakpentamir.com
pilgrimbaits-premium.com
ab5pp.com
fjtts.com
stpelectronics.com
foraol.com
protagonista.info
nigeriasno1datingsite.com
dignity.live
bodyworldholdings.com
01lover.com
wwwjinsha045.com
serverlan.info
themachinevspeople.info
bergencountyautosales.com
hillsidemanor.house
sergiypavlyukphoto.com
abetterforupgrades.date
lokireddygroup.com
il-hotels-review.com
stone-interieur.com
sistemasucma.com
intersectventures.com
westonnissannw.info
vercour-mezo.com
oceanclub1.com
galexmulti.com
aajkapakistan.com
towzoom.com
krcgf.info
com-lphone.info
overcold.com
5008123.com
jbxdev.com
cozero.com
lifeforhealth74.com
revolicthailand.com
chungcu-paragontower.net
blink-boutique.com
pst-pure.energy
2ndwind.info
newyorkartbeat.net
xn--2qux23cg7bq62b.com
withdrawfromroute.com
archeractuarial.com
brianreynaphoto.com
calliluggage.com
xn--zoom-9j3po85on3dfpf.com
kf575.com
odv.asia
gaziantepulucanlarasm.com
ynhuiniu.com
betingirnavad90.com
substitutionshelp.accountant
ekvpres.com
letsgooba.com
lbdaycarecenter.com
beehappyplanting.com
zhaozushou.com
ronaqalamerat.com
softball.place
iccampionihotel.com
prashiru.com
coterielancaster.net
menflax.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2240-129-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/3756-134-0x0000000001670000-0x00000000017BA000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exedescription pid process target process PID 3756 set thread context of 2240 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exepid process 2240 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 2240 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exepid process 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exepid process 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exedescription pid process target process PID 3756 wrote to memory of 4080 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 4080 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 4080 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 4076 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 4076 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 4076 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 3964 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 3964 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 3964 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 1856 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 1856 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 1856 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 2240 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 2240 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 2240 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 2240 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe PID 3756 wrote to memory of 2240 3756 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe 66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"C:\Users\Admin\AppData\Local\Temp\66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37.exe"2⤵
- Suspicious behavior: EnumeratesProcesses