Analysis
-
max time kernel
171s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 10:54
Static task
static1
Behavioral task
behavioral1
Sample
stud.exe
Resource
win7-20220414-en
General
-
Target
stud.exe
-
Size
755KB
-
MD5
6044900d66376321ad6f237d1b465ecc
-
SHA1
0147db0583256b648680a54573b288f9167cca67
-
SHA256
9099123ab27c467c09e2483339756820e29e6d8cd3d0346305d3873902e4af65
-
SHA512
03fdca6dfdccc2a17abbfb42adfb5a89a5e2a32b9929efde0689da17967db406dd55f057162d2324605254c354130c8b73077fa9bc4bf23053878ffc5f239076
Malware Config
Extracted
formbook
4.1
asa2
kznbf.info
dl-today.com
jiucai1688.com
makrobet508.com
xjyyjx.com
xn--riqq15a1oh5j5a.com
ecotrait.com
668opebet.com
lucyloveboutique.com
suddenslim.com
mettsing.com
0pe816.com
expressionsofebony.com
ripleychurchofchrist.com
cwinterim.com
qilu129.com
enoteca17.com
itbpolice.com
shoulderworkmassage.com
02lh.com
perfect-juliettshape.info
wallmeds.com
4e57.com
irishpubavila.com
atwbnut.com
shreeomgarage.com
isayamatetsuji.com
metcon-fitness.com
dl-team.com
arma3qmgl.com
sfnbhvg.com
wozzcom.net
695yx.com
citacation.com
muychile.com
drmanyam.com
alexbrigham.com
jiou.group
maogf.com
isabelbraun.com
021fapiao.com
gnhqn.info
todreamcorp.com
keytes.net
themodernreviewer.com
vns68668.com
boutiquegianna.com
approvedaero.info
pearsonpropertiesug.com
hurrahsoft.com
swanmaids.store
mingwang.site
photographybydor.com
jordankylemusic.com
martinispalounge.com
altyazilipornooizle.com
lauron-avocat.com
fengshuomei88.com
winmirth.com
younggrafx.com
gipa.ltd
maisanime.com
proficet.net
u-logy.net
regulars5.info
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/624-63-0x0000000000090000-0x00000000000BD000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1696 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
stud.exestud.exewuapp.exedescription pid process target process PID 1376 set thread context of 1792 1376 stud.exe stud.exe PID 1792 set thread context of 1256 1792 stud.exe Explorer.EXE PID 624 set thread context of 1256 624 wuapp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
stud.exestud.exewuapp.exepid process 1376 stud.exe 1792 stud.exe 1792 stud.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe 624 wuapp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
stud.exestud.exewuapp.exepid process 1376 stud.exe 1792 stud.exe 1792 stud.exe 1792 stud.exe 624 wuapp.exe 624 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
stud.exewuapp.exedescription pid process Token: SeDebugPrivilege 1792 stud.exe Token: SeDebugPrivilege 624 wuapp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
stud.exeExplorer.EXEwuapp.exedescription pid process target process PID 1376 wrote to memory of 1792 1376 stud.exe stud.exe PID 1376 wrote to memory of 1792 1376 stud.exe stud.exe PID 1376 wrote to memory of 1792 1376 stud.exe stud.exe PID 1376 wrote to memory of 1792 1376 stud.exe stud.exe PID 1256 wrote to memory of 624 1256 Explorer.EXE wuapp.exe PID 1256 wrote to memory of 624 1256 Explorer.EXE wuapp.exe PID 1256 wrote to memory of 624 1256 Explorer.EXE wuapp.exe PID 1256 wrote to memory of 624 1256 Explorer.EXE wuapp.exe PID 1256 wrote to memory of 624 1256 Explorer.EXE wuapp.exe PID 1256 wrote to memory of 624 1256 Explorer.EXE wuapp.exe PID 1256 wrote to memory of 624 1256 Explorer.EXE wuapp.exe PID 624 wrote to memory of 1696 624 wuapp.exe cmd.exe PID 624 wrote to memory of 1696 624 wuapp.exe cmd.exe PID 624 wrote to memory of 1696 624 wuapp.exe cmd.exe PID 624 wrote to memory of 1696 624 wuapp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\stud.exe"C:\Users\Admin\AppData\Local\Temp\stud.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\stud.exe"C:\Users\Admin\AppData\Local\Temp\stud.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:580
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\stud.exe"3⤵
- Deletes itself
PID:1696
-
-