Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 20:55
Static task
static1
Behavioral task
behavioral1
Sample
1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe
Resource
win7-20220414-en
General
-
Target
1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe
-
Size
744KB
-
MD5
b008fa1238c06f2948c339816baa3a05
-
SHA1
660c93249e93100649fcd8812d83c4e61a0acd47
-
SHA256
1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a
-
SHA512
ea8816b592e9ae94820fd2a9e2dd389d5f711d9c46c4004c16c5205f20f157721b29bb73f7fa7397843fb67b7d461a6826860c6e24239865d24ed93b25fe093c
Malware Config
Extracted
formbook
3.8
h28
sfhhhh.com
nhamaythaovy.com
ecbullets.com
lostoreadosspecial.online
iamgreatai.com
633osi.info
larsaofrancisco.com
antibakterijski-tepih.com
adiv-rapport.com
ekonominix.com
collectiveaccesscommunity.net
supermall.online
210pe.com
securitylogic.info
akbanksube.biz
rplxal.info
lkpyxn.com
lakecityplayhouse.com
wove.ltd
americanrealestate.loan
othezv.men
smhga.info
thwartbackpain.com
cafeconcierto.com
79us5n.info
heseniorlivingmax.live
theamsterdammer.com
sleekenergy.com
tcgrand.net
tadjzfn.com
docsignal.com
mbmountainadventures.com
allianzoncloud.com
vision-petlon.com
pkf-alba.net
doamininaustralia.win
autopartsbatterij.com
dewu.ltd
xn--289ar1wtta.com
xyc22222.com
andsoitflows.com
haimenzhichuang.com
bebas.live
vietlemedia.com
ritzwear.com
bjconstructiongroup.com
sperrysocialmedia.com
clvermelhos.com
jasonjoseph-mail.com
liansuo5188.com
applustp.reisen
touchwear.care
konaien.com
thesrinivas.com
lynwo.com
facingwest.coffee
uemjresult.online
calavaryarts.com
hwaings.com
aslqrm.info
manumittere.com
sohbetsamata.com
allsystemsforupdate.win
onetrudog.com
available2.info
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral1/memory/1600-58-0x0000000000000000-mapping.dmp formbook behavioral1/memory/1600-60-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1600 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27 PID 1980 wrote to memory of 1600 1980 1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe"C:\Users\Admin\AppData\Local\Temp\1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe"C:\Users\Admin\AppData\Local\Temp\1e809cad1b9983f1f2927093abcf1b981a7d51c92aa4df9cc2ed6fc8cd92196a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-