Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
f6c8a8e5346a698e0733248a0ec6e323.exe
Resource
win7-20220715-en
General
-
Target
f6c8a8e5346a698e0733248a0ec6e323.exe
-
Size
320KB
-
MD5
f6c8a8e5346a698e0733248a0ec6e323
-
SHA1
6e0be3bcd53afae69635fdecb1b7f350f9306563
-
SHA256
fc6dd1debc45ce8b420b281bda6fdf1bc103e4c977009a954924ca50d95bd7ba
-
SHA512
076578e7d60d26215fb7f43b58873abda5ee83bf31d8969b0a0ca9a8bdf91774487ece9d6ffb6a32c57154269d84f9ac2c3926bc76e944b87c59fc9f2d5dfd84
Malware Config
Extracted
formbook
4.1
eni9
serenatutino.com
oshuncleaningservices.com
themodernring.com
elhoodurbano.com
borntobeabrand.com
wingene168.com
raising.cloud
kumen.store
azdistribution.store
myrecordingapp.com
minshu.info
zhongxiangxinge.com
linentemptation.com
corealestatevideo.com
carpection.com
mompreneur.services
ent34.com
udicoin.net
trulyclassical.com
paraalemdatela.com
anandajewelry.com
thewholewardrobe.com
deltagroupservices.com
sts--pl.com
matrongviet.com
jinyushopa.club
felizrealize.xyz
teen18top.com
wunderagentur.com
rajeshsk.world
vip89.club
skixxx.art
referee4tkd.net
thetoybusters.online
134226.com
librettodistruzione.online
kuriceberry.com
deletepeople.com
glazefiesta.com
dispacauca.com
potheads.international
taxikone.com
food-services-d.space
solgengarage.com
mensajeriajsd.com
whiteworkshopnco.com
ryluxglobal.online
fy70w.com
gehadesign.com
uplifted.quest
huojianzhibo.com
fasciasupplements.com
logancastinggroup.com
ncia.academy
sanotpo.com
guttergirl.style
insuranceinfohub.com
personalassistanttools.com
bogurashops.com
stmotores.com
financialincubatorsolutions.com
tinyhumanschoolhouse.com
yongdapiao.com
bioteksystem.com
666hcm.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4492-135-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f6c8a8e5346a698e0733248a0ec6e323.exedescription pid process target process PID 4936 set thread context of 4492 4936 f6c8a8e5346a698e0733248a0ec6e323.exe f6c8a8e5346a698e0733248a0ec6e323.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f6c8a8e5346a698e0733248a0ec6e323.exepid process 4492 f6c8a8e5346a698e0733248a0ec6e323.exe 4492 f6c8a8e5346a698e0733248a0ec6e323.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f6c8a8e5346a698e0733248a0ec6e323.exedescription pid process target process PID 4936 wrote to memory of 4492 4936 f6c8a8e5346a698e0733248a0ec6e323.exe f6c8a8e5346a698e0733248a0ec6e323.exe PID 4936 wrote to memory of 4492 4936 f6c8a8e5346a698e0733248a0ec6e323.exe f6c8a8e5346a698e0733248a0ec6e323.exe PID 4936 wrote to memory of 4492 4936 f6c8a8e5346a698e0733248a0ec6e323.exe f6c8a8e5346a698e0733248a0ec6e323.exe PID 4936 wrote to memory of 4492 4936 f6c8a8e5346a698e0733248a0ec6e323.exe f6c8a8e5346a698e0733248a0ec6e323.exe PID 4936 wrote to memory of 4492 4936 f6c8a8e5346a698e0733248a0ec6e323.exe f6c8a8e5346a698e0733248a0ec6e323.exe PID 4936 wrote to memory of 4492 4936 f6c8a8e5346a698e0733248a0ec6e323.exe f6c8a8e5346a698e0733248a0ec6e323.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6c8a8e5346a698e0733248a0ec6e323.exe"C:\Users\Admin\AppData\Local\Temp\f6c8a8e5346a698e0733248a0ec6e323.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\f6c8a8e5346a698e0733248a0ec6e323.exe"C:\Users\Admin\AppData\Local\Temp\f6c8a8e5346a698e0733248a0ec6e323.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-