Analysis
-
max time kernel
110s -
max time network
128s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 01:43
Static task
static1
General
-
Target
8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe
-
Size
778KB
-
MD5
09106fd4669886c1de4e049bb57e1228
-
SHA1
21af8e129c05e0cbbf33f4e155d4ebbfcaaa2155
-
SHA256
8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae
-
SHA512
1ca4f90efac305a0bce470263e2e6cff45e28029540123db54f9e5461ec4ae099f95384deade9c4160f9eea18c31d4b156513ee4ef628a99380af831d6383505
Malware Config
Extracted
formbook
4.1
jy93
alexito.space
shitsthebalm.com
margaritavillemelbourne.com
vonahk.xyz
1960lawn.com
augustacrim.com
bancopec.com
batrainingstudio.com
kokofleks.store
w4-form-irs.com
putnamob.com
mickeysmotors.com
8181yd.com
wedmecreation.com
mischianti.com
gskpop.com
douvip303.com
unlimitedlyfestylez.com
originophthalmics.com
oandazx86.xyz
aflambooks.com
woningkeuren.com
qiyepin.com
referto-online.com
philadelphiaguitarnews.com
wilhelmenaagency.com
visionbox.xyz
exmarry.com
obtainfollowers.com
conationcrossing.com
podiatrybroker.com
natistyle.com
livingessencewater.com
highperformancevehicles.com
undangannikahku.xyz
longlakehomesales.com
pridecocapital.com
prolificgraph.com
greatbayhme.com
bestplant.xyz
lesbianparadise.com
tabvern.com
electronix101.com
mhw44.xyz
xn--arbetslivsaktren-ywb.com
starpromocoes.com
123387lx.com
gunwicam.com
christophergallaghermusic.com
hirevirtualexperts.com
sanjivanimart.com
xn--unww24c.xn--czru2d
xolegal.com
rfzjsb.com
aquaflor.online
masterstouchautomotive.com
comptechs2000.com
vgerlay.com
minifootball-promogive.com
newtech25.com
kilthiredirect.com
allinfobd24.com
mengabarkan.online
derva.link
expressingunderst.store
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3884-123-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exedescription pid process target process PID 2612 set thread context of 3884 2612 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exepid process 3884 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 3884 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exedescription pid process target process PID 2612 wrote to memory of 3884 2612 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe PID 2612 wrote to memory of 3884 2612 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe PID 2612 wrote to memory of 3884 2612 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe PID 2612 wrote to memory of 3884 2612 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe PID 2612 wrote to memory of 3884 2612 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe PID 2612 wrote to memory of 3884 2612 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe 8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe"C:\Users\Admin\AppData\Local\Temp\8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe"C:\Users\Admin\AppData\Local\Temp\8323bfa811d207521f4e833af08813c6a4431f9c28f6d07279b656a6a60e57ae.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2612-115-0x00000000005B0000-0x0000000000678000-memory.dmpFilesize
800KB
-
memory/2612-116-0x0000000005510000-0x0000000005A0E000-memory.dmpFilesize
5.0MB
-
memory/2612-117-0x0000000004EB0000-0x0000000004F42000-memory.dmpFilesize
584KB
-
memory/2612-118-0x0000000005010000-0x000000000550E000-memory.dmpFilesize
5.0MB
-
memory/2612-119-0x0000000004F50000-0x0000000004F5A000-memory.dmpFilesize
40KB
-
memory/2612-120-0x0000000005210000-0x000000000521C000-memory.dmpFilesize
48KB
-
memory/2612-121-0x00000000078A0000-0x000000000793C000-memory.dmpFilesize
624KB
-
memory/2612-122-0x0000000007B60000-0x0000000007BCA000-memory.dmpFilesize
424KB
-
memory/3884-123-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3884-124-0x0000000001180000-0x00000000014A0000-memory.dmpFilesize
3.1MB