Overview
overview
10Static
static
10files/1.exe
windows7-x64
1files/1.exe
windows10-2004-x64
1files/10.exe
windows7-x64
7files/10.exe
windows10-2004-x64
7files/11.exe
windows7-x64
10files/11.exe
windows10-2004-x64
10files/12.exe
windows7-x64
8files/12.exe
windows10-2004-x64
8files/13.exe
windows7-x64
10files/13.exe
windows10-2004-x64
10files/14.exe
windows7-x64
10files/14.exe
windows10-2004-x64
10files/15.exe
windows7-x64
10files/15.exe
windows10-2004-x64
10files/2.exe
windows7-x64
10files/2.exe
windows10-2004-x64
10files/3.exe
windows7-x64
10files/3.exe
windows10-2004-x64
10files/4.exe
windows7-x64
10files/4.exe
windows10-2004-x64
10files/5.exe
windows7-x64
10files/5.exe
windows10-2004-x64
10files/6.exe
windows7-x64
6files/6.exe
windows10-2004-x64
6files/7.exe
windows7-x64
10files/7.exe
windows10-2004-x64
10files/8.exe
windows7-x64
10files/8.exe
windows10-2004-x64
10files/9.exe
windows7-x64
10files/9.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 05:57
Behavioral task
behavioral1
Sample
files/1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
files/1.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral3
Sample
files/10.exe
Resource
win7-20220715-en
Behavioral task
behavioral4
Sample
files/10.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral5
Sample
files/11.exe
Resource
win7-20220715-en
Behavioral task
behavioral6
Sample
files/11.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral7
Sample
files/12.exe
Resource
win7-20220715-en
Behavioral task
behavioral8
Sample
files/12.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral9
Sample
files/13.exe
Resource
win7-20220715-en
Behavioral task
behavioral10
Sample
files/13.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral11
Sample
files/14.exe
Resource
win7-20220715-en
Behavioral task
behavioral12
Sample
files/14.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral13
Sample
files/15.exe
Resource
win7-20220715-en
Behavioral task
behavioral14
Sample
files/15.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral15
Sample
files/2.exe
Resource
win7-20220718-en
Behavioral task
behavioral16
Sample
files/2.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral17
Sample
files/3.exe
Resource
win7-20220715-en
Behavioral task
behavioral18
Sample
files/3.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral19
Sample
files/4.exe
Resource
win7-20220718-en
Behavioral task
behavioral20
Sample
files/4.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral21
Sample
files/5.exe
Resource
win7-20220718-en
Behavioral task
behavioral22
Sample
files/5.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral23
Sample
files/6.exe
Resource
win7-20220715-en
Behavioral task
behavioral24
Sample
files/6.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral25
Sample
files/7.exe
Resource
win7-20220718-en
Behavioral task
behavioral26
Sample
files/7.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral27
Sample
files/8.exe
Resource
win7-20220718-en
Behavioral task
behavioral28
Sample
files/8.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral29
Sample
files/9.exe
Resource
win7-20220718-en
General
-
Target
files/14.exe
-
Size
632KB
-
MD5
cf123d2f8c6cf7a88472483607163eb5
-
SHA1
7f15a558d3d63d689d754d3cea804b9ebb79c50b
-
SHA256
f11ce5b6edfa6ee04b2334cb820f03fd99df64185daf857f4a241653ef2f1a64
-
SHA512
9b9bb092d139447df86a8286dae1907f56e624e0324ec693e9f91c1b0f2e25041e3187fe44ae618b6cdf35715373ff05b5825d416fb9d858bf265b44cb26ed6d
Malware Config
Extracted
formbook
3.8
di
baoxiaofan.com
bestwaycartage.com
sag-architecture.com
salamcanteen.com
clinicalpsychologistkerala.com
mttv222.com
theweproject.com
fybbracelets.net
vv666h.com
bangfupin.com
arkprojetos.com
realgoaldigger.com
pilotedphotography.com
6zonxm55.biz
gaoduanmi.com
aminahmad.com
bountymarketing.net
christopher-rennebach.com
02xjys.faith
estilomiau.com
emoneysinhalen.com
av3rytin.com
chinabigtree.com
bless-corporation.com
archispectus.com
thedesignerslab.com
happylax.com
haxballeu.com
tryincubator.com
xmchenhe.com
icantwaittovoteagain.com
xahhr.net
allsaddledup.com
sanjuanislandsoap.net
alkhalid-group.com
fuji-qlick.com
knattertones.info
crackionic.com
zublin-perriere.net
shopesg.com
breastcarehk.com
ttnyfw.com
communistv.com
thfcfirstvariablelimited.com
rickeracheatingplumbing.com
susanamartineznotario.com
fuje.ltd
278manbet.com
elshabory.com
gaxxe.loan
florespreservadas.net
millionethomepage.com
cqkxcg.com
blockchhain.info
atiwhere.com
iot-king.com
pbbzh.win
colachain.com
verifuurbank.com
theplastercompany.com
ad-3.biz
tacootje.com
rushmad.win
galleryjoelle.com
spotekw.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral12/memory/536-133-0x0000000000000000-mapping.dmp formbook behavioral12/memory/536-135-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral12/memory/536-141-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral12/memory/3568-144-0x0000000000690000-0x00000000006BA000-memory.dmp formbook behavioral12/memory/3568-148-0x0000000000690000-0x00000000006BA000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 536 set thread context of 2476 536 14.exe 56 PID 3568 set thread context of 2476 3568 raserver.exe 56 -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 536 14.exe 536 14.exe 536 14.exe 536 14.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe 3568 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2476 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 536 14.exe 536 14.exe 536 14.exe 3568 raserver.exe 3568 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 536 14.exe Token: SeDebugPrivilege 3568 raserver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4400 14.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 4400 wrote to memory of 536 4400 14.exe 81 PID 2476 wrote to memory of 3568 2476 Explorer.EXE 82 PID 2476 wrote to memory of 3568 2476 Explorer.EXE 82 PID 2476 wrote to memory of 3568 2476 Explorer.EXE 82 PID 3568 wrote to memory of 4252 3568 raserver.exe 83 PID 3568 wrote to memory of 4252 3568 raserver.exe 83 PID 3568 wrote to memory of 4252 3568 raserver.exe 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\files\14.exe"C:\Users\Admin\AppData\Local\Temp\files\14.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\files\14.exe"C:\Users\Admin\AppData\Local\Temp\files\14.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\files\14.exe"3⤵PID:4252
-
-