Analysis
-
max time kernel
145s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
14-04-2022 06:53
Static task
static1
Behavioral task
behavioral1
Sample
95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe
Resource
win7-20220331-en
General
-
Target
95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe
-
Size
727KB
-
MD5
0d435fc2005ce7e69f850cc3e57712e3
-
SHA1
abf6796e578328c841042a14fe58300733fd0556
-
SHA256
95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888
-
SHA512
598426ab19450153c68abbda02755849d9bfc741a3d370501c95fc9c913d626f9e118c5852045a331b1d4aeef20ba9d811b328a4e2a0bf84c1c414bb3b79f756
Malware Config
Extracted
formbook
4.1
gae
haolexin.com
mediatradeprofiles.com
336540.com
khive.team
itbossinc.com
appantoniojoin.com
fleetalfa.com
szwrites.com
developistanbul.com
harrybuyshomes4fastcash.com
homelandmarkets.com
911directpp.com
bipocamerica.com
imperialdesignonline.com
covid-19tablets.info
tutorquranonline.com
dataaisummit.com
learn-interviewskills.com
trijayatekniktama.com
bulbalabs.com
mypersonaltrainerapp.info
wbtc.trade
bisneynow.com
yujian.info
meerkatstories.com
voteusa-store.com
collegeofwestchester.com
azsmokingstudy.com
nattsvartrecords.com
milhas-bb.com
inspirasihebat.com
explorexspace.com
anishcherian.com
jarageipel.com
lbsicecreamsandwichtruck.com
ssff00.com
caplimaz.website
erwinpoolcarellc.com
rabbithutchworld.net
imperative.guru
act2inc.com
therealhcg.com
walrons.com
beautifulmountainlife.com
yokozuna-dvd.com
vrimkadi.com
elainaraebeauty.com
pilatesordie.com
praisekittens.com
divineinspirationsrva.com
lacocinadeclara.com
stevebana.xyz
mkwadvisors.com
datacost.xyz
everifactassettlement.com
carolineshumate.com
kidslovedrbarton.com
fanamhotels.com
artworkofalexandbennett.com
jbicdvhai.icu
halalcoinstaking.community
lamajadadebarcina.com
culturasagrada.com
stalkdirtytome.com
21lsv.info
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
Formbook Payload 1 IoCs
resource yara_rule behavioral2/memory/1596-131-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 1596 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 1596 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93 PID 2192 wrote to memory of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93 PID 2192 wrote to memory of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93 PID 2192 wrote to memory of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93 PID 2192 wrote to memory of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93 PID 2192 wrote to memory of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93 PID 2192 wrote to memory of 1596 2192 95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe"C:\Users\Admin\AppData\Local\Temp\95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\95e46bda24b5240f0ee2c70793709836c568d27da06b7393c7ed5cb4d5f4d888.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-