Analysis
-
max time kernel
36s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 16:23
Static task
static1
Behavioral task
behavioral1
Sample
0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exe
Resource
win7-20220414-en
General
-
Target
0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exe
-
Size
592KB
-
MD5
eba12eb17ea697a548abca7bcf4bde71
-
SHA1
7bb9afa36f50360e562529b6b7cc097ca0f3b962
-
SHA256
0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4
-
SHA512
3659d873525629feb6b26883d3f1e461d86cf49af88024d6389aae2a1d18181a78b1dad77dbc56ec79223254be1567b80242d2d553768ee8b7d80c53ff38448c
Malware Config
Extracted
formbook
3.9
sh
albertparedes.com
landofblockchain.com
flowers2wedding.com
onlinespielenundgewinnen.com
f703148488.win
tomtrottine.com
2cha.net
my-c4eye.net
manchestermusicon.com
ezypzymoney.com
gongjiaochewang.com
sarmacontrol.com
sxxjqgcb.com
test-am-mpdm0709036.com
ganeshajayamandiri.com
brilliancegroupltd.com
ballylongfordwindfarm.com
arthuzo.com
vintagecargo360.com
off-duty.ninja
goinace.com
treatmentofmelanoma.click
bribirdhair.com
gcsdo.com
sherbakova16.com
mlswhatcom.com
onlinetradewebcordova.com
mysupportdesk.world
bxgzcw.com
ewelinast.com
baileyforstaterep.net
madadlabs.com
beatleapps.com
moxiedogs.com
qpz.info
dance-award.com
trendcollab.com
keyvandoukht.com
bakuoto-cineclub.info
weordinaryfolk.com
previewteck.com
xn--hgbk4a4e.com
jd037.com
xn--rao-nlat.com
trisotowebservices.online
visionforcesecurity.com
giftsterrace.com
union-instruments.net
primes.technology
joeheightsservices.com
xn--n8jw33vq2a.biz
uamodel.agency
sciencetower2.com
pleasureenterprises.com
albanyworksitetools.com
xnpartners.net
familyting.com
bodhispa.net
petssalonki.net
katherinewelch3.com
wwwblh9933.com
fantasticarte.net
desertcompassproperties.com
gmces.com
niveront.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1192-57-0x0000000000400000-0x0000000000499000-memory.dmp formbook behavioral1/memory/1192-58-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exepid process 1192 0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exepid process 1192 0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exe"C:\Users\Admin\AppData\Local\Temp\0a1c1f4b126157a9ab7e3b90718673794182bba279a567fc4204734383b7a8a4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1192-56-0x00000000765C1000-0x00000000765C3000-memory.dmpFilesize
8KB
-
memory/1192-57-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/1192-58-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1192-59-0x00000000036B1000-0x00000000036C2000-memory.dmpFilesize
68KB
-
memory/1192-60-0x00000000779A0000-0x0000000077B49000-memory.dmpFilesize
1.7MB
-
memory/1192-61-0x0000000077B80000-0x0000000077D00000-memory.dmpFilesize
1.5MB
-
memory/1192-62-0x000000000B880000-0x000000000BB83000-memory.dmpFilesize
3.0MB