Analysis
-
max time kernel
92s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 18:29
Static task
static1
Behavioral task
behavioral1
Sample
4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exe
Resource
win7-20220414-en
General
-
Target
4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exe
-
Size
280KB
-
MD5
12fb37f122adb02ce6d17aeb436111f9
-
SHA1
2e0a8d604227d8c24b1bdebb53d321c40a9fc4a2
-
SHA256
4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c
-
SHA512
cb8d0ec715609f8fb207c15079c0ecbab7023c9956727bed40678547a1325988994c2c1b2b6535422d86f75829a831ff20c96b1a639006f2059c43edba4902f1
Malware Config
Extracted
formbook
4.1
q5e
2177.ltd
thanxiety.com
max-width.com
fixti.net
mostmaj.com
mobilteknolojiuzmani.com
historyannals.com
wheelchairmotion.com
mossandmoonstonestudio.com
kastellifournis.com
axokey.net
peekl.com
metsteeshirt.com
abcfinancial-inc.com
btxrsp.com
amydh.com
ccoauthority.com
lumacorretora.com
kimfelixrealtor.com
iconext.biz
giftstgg.com
imonsanto.com
invoicefor.com
qfhxlw.com
wsykyy.com
gladius.network
peliculaslatino.online
timookflour.com
gxkuangjian.com
utvklj.men
rabota-v-avon.online
sheashealingway.com
thoitrangaoda.com
rytechweb.com
circuit69.com
crowd-design.biz
carosiandrhee.com
778d88.com
calvinkl.com
cjkit.com
jgkwhgxe.com
sanitascuadromedico.com
mellorangello.com
whiteinnocence.com
medtechdesignstudio.net
nurturingskin.com
guardyourweb.net
juw2017.com
jnheroes.com
damicosoftwaresystems.com
gesband.com
onwardsandupwards.info
gopropackaging.com
centerforaunts.com
sarrahshewdesign.com
intelligentcoach.net
iasisf.agency
products-news.com
calvinspring.com
100zan.site
9mahina.com
saleaustralianboots.com
floatinginfotech.com
calcinoneweek.com
yofdyk.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4344-131-0x0000000000DBD000-0x0000000000DEA000-memory.dmp formbook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1972 4344 WerFault.exe 4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exepid process 4344 4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exe 4344 4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exe"C:\Users\Admin\AppData\Local\Temp\4305e40a0eb2ed4133ad2b881d34f7cb4e31da8d3ccbc705968b6c6f79329d0c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 3842⤵
- Program crash
PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4344 -ip 43441⤵PID:4204