Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
31-01-2022 05:18
Static task
static1
Behavioral task
behavioral1
Sample
a506ca65b78a0c3475f855f463c0ce06.exe
Resource
win7-en-20211208
General
-
Target
a506ca65b78a0c3475f855f463c0ce06.exe
-
Size
534KB
-
MD5
a506ca65b78a0c3475f855f463c0ce06
-
SHA1
a28f9be767b628af5954de4c0218d7c75e1bfe16
-
SHA256
d0eabfe28f6b77c25d883ad3e380620f1367082cc58f309e4d24dd1d2c3548c8
-
SHA512
b2e6f535adaf821552f73fd6391dfb419359b8d9379ba1cf8a2a832b120bd570c8402f50906d3399a9a04205157b2780cc0e180470e4b53d2f9a04d9c7ae6058
Malware Config
Extracted
formbook
4.1
cw22
betvoy206.com
nftstoners.com
tirupatibuilder.com
gulldesigns.com
shemhq.com
boricosmetic.com
bitcoinbillionaireboy.com
theflypaperplanes.com
retrocartours.com
yangzhie326.com
cheepchain.com
sentryr.com
luckirentalhomes.com
pointssquashers.com
dianasarabiantreasures.com
calendarsilo.com
sublike21.xyz
gajubg0up.xyz
lousfoodreviews.com
fades.site
276a.xyz
chopkingstamp.com
parcelfrance.com
lcntrust.com
aeeg-austria.com
trogen24.net
widepeepohappy.xyz
hogekortingen.com
trump-is-right.net
legacyfarmsgeorgia.com
dingbuzhule.com
teckelgruppe-raben.com
qianshuhua.com
onsdia.xyz
sectorquant.com
automatenstudent.com
bathkithcenandtile.com
lasvegasphonerepairs.com
riselsat.com
myvafterdark.com
whispersystems.net
technicolorday.com
renetextile.xyz
cchcolo.com
professorjoshi.com
capybarashop.com
alfredoreyessci.com
w124blog.com
vdsdev77.com
helloentepriseg1.com
denlab.net
triviamillionairewin.com
jelofly.com
09m370uz.xyz
reple-top2.com
riosgames.xyz
teaberryadvisors.com
satgerv.online
galenika.net
landspeedlogistics.com
familiesgivinghope.com
moisuhop-channel.xyz
chambres-d-hotes-marrakech.com
realizefinanceirorennerr.com
playthemove.info
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1412-123-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a506ca65b78a0c3475f855f463c0ce06.exedescription pid process target process PID 2448 set thread context of 1412 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a506ca65b78a0c3475f855f463c0ce06.exea506ca65b78a0c3475f855f463c0ce06.exepid process 2448 a506ca65b78a0c3475f855f463c0ce06.exe 2448 a506ca65b78a0c3475f855f463c0ce06.exe 1412 a506ca65b78a0c3475f855f463c0ce06.exe 1412 a506ca65b78a0c3475f855f463c0ce06.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a506ca65b78a0c3475f855f463c0ce06.exedescription pid process Token: SeDebugPrivilege 2448 a506ca65b78a0c3475f855f463c0ce06.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a506ca65b78a0c3475f855f463c0ce06.exedescription pid process target process PID 2448 wrote to memory of 3996 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 3996 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 3996 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 1412 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 1412 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 1412 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 1412 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 1412 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe PID 2448 wrote to memory of 1412 2448 a506ca65b78a0c3475f855f463c0ce06.exe a506ca65b78a0c3475f855f463c0ce06.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a506ca65b78a0c3475f855f463c0ce06.exe"C:\Users\Admin\AppData\Local\Temp\a506ca65b78a0c3475f855f463c0ce06.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a506ca65b78a0c3475f855f463c0ce06.exe"C:\Users\Admin\AppData\Local\Temp\a506ca65b78a0c3475f855f463c0ce06.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\a506ca65b78a0c3475f855f463c0ce06.exe"C:\Users\Admin\AppData\Local\Temp\a506ca65b78a0c3475f855f463c0ce06.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1412-123-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1412-124-0x00000000017F0000-0x0000000001B10000-memory.dmpFilesize
3.1MB
-
memory/2448-115-0x00000000002A0000-0x000000000032C000-memory.dmpFilesize
560KB
-
memory/2448-116-0x0000000005240000-0x000000000573E000-memory.dmpFilesize
5.0MB
-
memory/2448-117-0x0000000004D40000-0x0000000004DD2000-memory.dmpFilesize
584KB
-
memory/2448-118-0x0000000004D40000-0x000000000523E000-memory.dmpFilesize
5.0MB
-
memory/2448-119-0x0000000004CA0000-0x0000000004CAA000-memory.dmpFilesize
40KB
-
memory/2448-120-0x0000000005080000-0x0000000005094000-memory.dmpFilesize
80KB
-
memory/2448-121-0x0000000000A50000-0x0000000000AEC000-memory.dmpFilesize
624KB
-
memory/2448-122-0x0000000000C40000-0x0000000000CA6000-memory.dmpFilesize
408KB