Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
31-01-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
663761b54a50098040c6a882fca010f0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
663761b54a50098040c6a882fca010f0.exe
Resource
win10v2004-en-20220113
General
-
Target
663761b54a50098040c6a882fca010f0.exe
-
Size
510KB
-
MD5
663761b54a50098040c6a882fca010f0
-
SHA1
271781ac1b7af0ef538fc37510add12cbef3253d
-
SHA256
3090eb9593159bb7832f0d55b935396e585d8095b4c7c5f07922848a41a20d70
-
SHA512
e642c9877e6487898d4d9bdc6283d7a7e4902c4a72a94ca25051d8c7f3e00b165258f96a8295df021aacd28fe959c71725a1beb4215022fcc5e88315c087bdba
Malware Config
Extracted
formbook
4.1
qugo
sathapornstainlesssteel.com
everythingisaninvestment.com
appsbyraf.com
superhornygirl.club
christmastreeclass.com
cheatdayztogo.com
aadent7.com
divinitypath.com
figuli563.com
distanzalojistik.com
pricelesslookyto-looktoday.info
pcaaems.com
itsnewmovie.com
4kx.claims
rental-aruyo.com
psiek.com
justnobleempress.com
40daysfor40nights.com
91266w.com
csi-texas.biz
laborbbpjnsumsel.com
chiroxpr.com
vipfb69.com
swedls.com
carmonaforcouncil.com
ezgovtfunds.com
bnqit.com
jonkospellen.online
easygojpn.com
boardwalksnj.com
hinrichs.digital
visionbankfl.com
voteronniboskovich.com
lootproject.club
wajeehi.net
jasapengerjaanskripsi.com
hustlerbandz.com
builtkh.com
theeggsstory.com
doctornotaryservice.com
sportsfanmd.com
matrix-casino.com
jumpandbouncehouserental.com
infoecommercepro.com
flowerdiscount.store
b95213.com
dualipaphiladelphia.com
opalandamber.com
impiantidentalibuscaritaorg.com
mmpluk.com
rpcbtt.space
melancholizm.com
odemix.com
klm-med.store
thinkdelivery.net
lifeonticotime.com
harsors.com
mollymo.online
rab.bet
anubhav.pictures
mauromarchesini.com
tokiwa-test.com
livia-rony.com
sgames.space
monimmo3d.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-61-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
663761b54a50098040c6a882fca010f0.exedescription pid process target process PID 1600 set thread context of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
663761b54a50098040c6a882fca010f0.exepid process 1736 663761b54a50098040c6a882fca010f0.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
663761b54a50098040c6a882fca010f0.exedescription pid process target process PID 1600 wrote to memory of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe PID 1600 wrote to memory of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe PID 1600 wrote to memory of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe PID 1600 wrote to memory of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe PID 1600 wrote to memory of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe PID 1600 wrote to memory of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe PID 1600 wrote to memory of 1736 1600 663761b54a50098040c6a882fca010f0.exe 663761b54a50098040c6a882fca010f0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\663761b54a50098040c6a882fca010f0.exe"C:\Users\Admin\AppData\Local\Temp\663761b54a50098040c6a882fca010f0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\663761b54a50098040c6a882fca010f0.exe"C:\Users\Admin\AppData\Local\Temp\663761b54a50098040c6a882fca010f0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1600-54-0x00000000009B0000-0x0000000000A36000-memory.dmpFilesize
536KB
-
memory/1600-55-0x0000000075CE1000-0x0000000075CE3000-memory.dmpFilesize
8KB
-
memory/1600-56-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/1600-57-0x0000000000530000-0x0000000000544000-memory.dmpFilesize
80KB
-
memory/1600-58-0x0000000004E30000-0x0000000004E96000-memory.dmpFilesize
408KB
-
memory/1736-59-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1736-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1736-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB