Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-06-2022 08:31
Static task
static1
Behavioral task
behavioral1
Sample
266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe
Resource
win7-20220414-en
General
-
Target
266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe
-
Size
660KB
-
MD5
98d1100c39a023253cd46122e0a8820e
-
SHA1
317b29e44ebbb9659203c1ed96ab1d73d6b540dd
-
SHA256
266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11
-
SHA512
777335c56e065d1810251db4cdcda1e1ee6ec13cd0e47f89203a80e3d6497938a14f560c2b23f24dfd2c76c5509c863f03be6a6df102455aaa24f91bd7d47020
Malware Config
Extracted
formbook
3.9
ho
3dprintedphotography.com
surgeinor.com
goletavalleytechcenter.com
fort41.net
mudita.studio
pesticides-suppliers.com
al98ce.biz
berybest.com
siedumat.com
tomengrain.net
sunnyskiesvaca.info
centrocomercialatlantida.com
umeof.info
sequoiasurfacing.com
lacodeouro.com
somotorbike.com
chancetobloew.com
mcrikos.com
qizhangke.com
sugarnotchsawmill.com
drtimmathisdds.com
bolehtoon.net
syncwave.technology
rosepita.com
prospector.studio
restogueuledebois.com
1800pe.com
harvey-lawsuits.com
thegardenmed.online
borona.info
parrowed.com
thefreshfoods.com
lvxvqp.info
healthcarings.com
tofroshop.com
harapanjaya.site
dudespa.life
xyzconnection.info
oleodericinocabelo.com
changlianchem.com
ailykeu.com
chucibz.com
dnsfw.info
lrsqzy.info
gethomecoverage.rocks
lifethrottledback.com
0m3tenbecause.men
nuttcase.com
sheshowhe.com
catatanernest.com
infinitearrival.com
brownfantasymarble.com
iraqi-dream.com
yeye85.com
sushiarmy.com
concentrationcamp.net
cookarevegano.com
emotizen.com
makrobet702.com
jkijhijsa.com
yuntuziben.net
app7188.com
ppgan18.com
thoughtsofawomanrevealed.com
paltox.com
Signatures
-
Formbook Payload 1 IoCs
resource yara_rule behavioral2/memory/4180-136-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4776 set thread context of 4180 4776 266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe 80 -
Program crash 2 IoCs
pid pid_target Process procid_target 1312 4180 WerFault.exe 80 1992 4180 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4180 266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe 4180 266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4776 266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4180 4776 266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe 80 PID 4776 wrote to memory of 4180 4776 266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe 80 PID 4776 wrote to memory of 4180 4776 266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe"C:\Users\Admin\AppData\Local\Temp\266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exeC:\Users\Admin\AppData\Local\Temp\266b94576fc5f21b1958e202c1e6296f95b247e0c02cb4683b8e164ec84d9a11.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 4243⤵
- Program crash
PID:1312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 4683⤵
- Program crash
PID:1992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4180 -ip 41801⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4180 -ip 41801⤵PID:4192