Analysis
-
max time kernel
64s -
max time network
63s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
06-07-2022 00:55
Static task
static1
General
-
Target
79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe
-
Size
538KB
-
MD5
c0138bfa58d20206600eaf1657f95f75
-
SHA1
fa232e4df93c81093044ff552381d41ebcc5f443
-
SHA256
79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1
-
SHA512
082a20109057787fdb3d8bfa5607e379c4d803d862367078e24a40018c3a6ed4fa3c09ce0c95152a169cfa98f2348c47e20af1cbf4b69dd164fcc6b9a80040bd
Malware Config
Extracted
formbook
4.1
bk19
parkersuite.com
quanzhujs.com
ofourfuture.com
palazzonutraceuticals.com
xowshfv.top
casinoguide.bet
kangdurian.com
luxurymainewaterfront.com
sdjyyy.com
uglymugvs.com
lawncaregeni.com
simproful.net
upskirts-tube.com
taiylormade.com
okyxx1k4w.digital
shop-marvel.direct
tecdiario.com
click2claim.xyz
2dot2dot.space
gercektarih.online
gyovanaellen.com
sparkcreativesolution.com
i689.xyz
dawnrogerslaw.com
kahiankahibattein.online
jinsuncrafts.com
6l4ji5.xyz
greatfortuneindonesia.com
algosino.space
renewyougetaways.com
lifeoffem.com
dcorate.life
guomeiyishu.com
trendwebz.com
supportwildz.com
plazapaisa.com
championwordtoknow-today.info
china-visa-online.com
ftxtoken.world
tokmanloveincoma.xyz
vibesrackett.info
commodities-market.com
se-promo.com
thingstodoincumrbia.com
montfort.store
csmim.com
ncmlef.com
surveygalaxyusa.com
wxpf.space
funnygirlz.xyz
cludecreamcoin.xyz
jtexpressgroup.com
82900580.com
osteriacorsetti1921.com
bejamus.xyz
watclov.xyz
muscle-slave.club
cylgjyx.com
gestionesya.online
gardenerofedenfarms.com
bylolo.com
m-maket.com
cathetustec.info
newopenings4.com
rund8.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4164-183-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/4164-184-0x000000000041F0D0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exedescription pid process target process PID 4656 set thread context of 4164 4656 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exepid process 4164 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 4164 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exedescription pid process target process PID 4656 wrote to memory of 4164 4656 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe PID 4656 wrote to memory of 4164 4656 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe PID 4656 wrote to memory of 4164 4656 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe PID 4656 wrote to memory of 4164 4656 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe PID 4656 wrote to memory of 4164 4656 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe PID 4656 wrote to memory of 4164 4656 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe 79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe"C:\Users\Admin\AppData\Local\Temp\79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe"C:\Users\Admin\AppData\Local\Temp\79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4164-183-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4164-184-0x000000000041F0D0-mapping.dmp
-
memory/4164-185-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4164-186-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4164-187-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4164-191-0x0000000001100000-0x0000000001420000-memory.dmpFilesize
3.1MB
-
memory/4656-145-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-120-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-117-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-118-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-119-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-150-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-121-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-122-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-123-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-151-0x0000000005500000-0x00000000059FE000-memory.dmpFilesize
5.0MB
-
memory/4656-125-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-126-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-127-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-128-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-129-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-130-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-131-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-132-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-133-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-134-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-135-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-136-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-137-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-138-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-139-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-140-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-141-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-142-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-143-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-144-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-115-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-146-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-147-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-148-0x0000000000610000-0x000000000069C000-memory.dmpFilesize
560KB
-
memory/4656-179-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-116-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-124-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-152-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-153-0x0000000005000000-0x0000000005092000-memory.dmpFilesize
584KB
-
memory/4656-154-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-155-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-156-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-157-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-158-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-159-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-160-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-161-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-162-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-163-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-164-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-165-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-166-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-167-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-168-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-169-0x0000000004EC0000-0x0000000004ECA000-memory.dmpFilesize
40KB
-
memory/4656-170-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-171-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-172-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-173-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-174-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-175-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-176-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-177-0x00000000054E0000-0x00000000054FC000-memory.dmpFilesize
112KB
-
memory/4656-114-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-178-0x0000000008370000-0x000000000837A000-memory.dmpFilesize
40KB
-
memory/4656-149-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/4656-180-0x00000000085D0000-0x000000000863C000-memory.dmpFilesize
432KB
-
memory/4656-181-0x0000000008700000-0x000000000879C000-memory.dmpFilesize
624KB
-
memory/4656-182-0x0000000000750000-0x0000000000784000-memory.dmpFilesize
208KB