Analysis
-
max time kernel
126s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
31-01-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
9afab2ef4657edb330c16533e7829faa.exe
Resource
win7-en-20211208
General
-
Target
9afab2ef4657edb330c16533e7829faa.exe
-
Size
537KB
-
MD5
9afab2ef4657edb330c16533e7829faa
-
SHA1
6bd646737538682c96b300e491a78f5f3744e1dc
-
SHA256
a9ee744d7181c80db0ffbabf36933b815cf8b731ad6fb920393fb325cdfce9cc
-
SHA512
1053273e2563fa452a57c939dba887215900c858407d637b8c11f1fd8595c5c479f2f6245a2052d2e0def575d87972070870578f07d83f1de53481d8e0fb861c
Malware Config
Extracted
formbook
4.1
d7ln
bulut-imza.com
gotastebuds.com
shutupmags.com
clocksport.com
toweryachtcounsel.com
kingcopier.com
pluspersona.com
inchallahe.com
unclonedconsulting.com
ccdt168.com
tonyzheng.xyz
voiceoftheepeople.com
cicapital.xyz
offxpro.com
loyatiproductions.com
makemebuystuff.com
incuba8labs.com
remparka.com
newstft.com
bgame.pro
croniesnft.xyz
petaouchnock.site
gavesett.com
smarthousegroup.net
kkqdqj.mobi
glatdelate.quest
sharpmage.com
penis.today
squidscatter.com
digfinancial.com
imx.fund
bigbet3269.com
leatherlidinserts.net
eyecollection-nishigifu.com
wagyuchefs.com
cafeandbakecestbon.com
appsy.tech
johnmaxwelltam.com
eternity-warm.com
naebidynamic.com
landgrunt.com
chap-immo.com
wgzywz.com
zawovu.com
shortsvault.com
squidgameoutfitsss.com
keaneoil.com
v44881.com
spartanboardgames.com
rotcid.xyz
qvconsultants.com
reinorshine.com
turkeyetrade.com
webcomprei.com
00010shou.com
tiffanyandjose.com
todd4mayor.com
designbydb.com
higherj.com
delicatmnl.com
huamanishop.com
pinkle-store.com
gatewaytothegreatoceanroad.com
felerritst.quest
mottpolis.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2832-126-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9afab2ef4657edb330c16533e7829faa.exedescription pid process target process PID 1904 set thread context of 2832 1904 9afab2ef4657edb330c16533e7829faa.exe 9afab2ef4657edb330c16533e7829faa.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9afab2ef4657edb330c16533e7829faa.exepid process 2832 9afab2ef4657edb330c16533e7829faa.exe 2832 9afab2ef4657edb330c16533e7829faa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9afab2ef4657edb330c16533e7829faa.exedescription pid process target process PID 1904 wrote to memory of 2832 1904 9afab2ef4657edb330c16533e7829faa.exe 9afab2ef4657edb330c16533e7829faa.exe PID 1904 wrote to memory of 2832 1904 9afab2ef4657edb330c16533e7829faa.exe 9afab2ef4657edb330c16533e7829faa.exe PID 1904 wrote to memory of 2832 1904 9afab2ef4657edb330c16533e7829faa.exe 9afab2ef4657edb330c16533e7829faa.exe PID 1904 wrote to memory of 2832 1904 9afab2ef4657edb330c16533e7829faa.exe 9afab2ef4657edb330c16533e7829faa.exe PID 1904 wrote to memory of 2832 1904 9afab2ef4657edb330c16533e7829faa.exe 9afab2ef4657edb330c16533e7829faa.exe PID 1904 wrote to memory of 2832 1904 9afab2ef4657edb330c16533e7829faa.exe 9afab2ef4657edb330c16533e7829faa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9afab2ef4657edb330c16533e7829faa.exe"C:\Users\Admin\AppData\Local\Temp\9afab2ef4657edb330c16533e7829faa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9afab2ef4657edb330c16533e7829faa.exe"C:\Users\Admin\AppData\Local\Temp\9afab2ef4657edb330c16533e7829faa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-118-0x00000000006E0000-0x000000000076C000-memory.dmpFilesize
560KB
-
memory/1904-119-0x00000000056C0000-0x0000000005BBE000-memory.dmpFilesize
5.0MB
-
memory/1904-120-0x00000000050E0000-0x0000000005172000-memory.dmpFilesize
584KB
-
memory/1904-121-0x00000000051C0000-0x00000000056BE000-memory.dmpFilesize
5.0MB
-
memory/1904-122-0x0000000005190000-0x000000000519A000-memory.dmpFilesize
40KB
-
memory/1904-123-0x00000000056A0000-0x00000000056B4000-memory.dmpFilesize
80KB
-
memory/1904-124-0x00000000078E0000-0x000000000797C000-memory.dmpFilesize
624KB
-
memory/1904-125-0x0000000007A90000-0x0000000007AF6000-memory.dmpFilesize
408KB
-
memory/2832-126-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2832-127-0x00000000019C0000-0x0000000001CE0000-memory.dmpFilesize
3.1MB