Analysis
-
max time kernel
57s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-09-2022 15:34
Static task
static1
Behavioral task
behavioral1
Sample
c2724b5bece3913584ce76a11e2b6414.exe
Resource
win7-20220812-en
General
-
Target
c2724b5bece3913584ce76a11e2b6414.exe
-
Size
899KB
-
MD5
c2724b5bece3913584ce76a11e2b6414
-
SHA1
dd65c490d2e5ea690a3522e680169e1c748ad605
-
SHA256
0edf2a0a4fe852db8050d58c5698b71b14a8346022eccc5180f5acd0378a9966
-
SHA512
cfe497fef745d9e2f59889cf95019187179e55ae89dcc44b0078b44229d95e1712b29d42facd7e1c9851e5a6a3257dc4756ac2b6e0dc1709f1c173429fb9d8cf
-
SSDEEP
12288:yHF75eSgPwqoXY+mzoRtbvRT75yzcv6Fe5pNtSuz6FbIo0fRw1hDs/7bDI:0Z5LXY+mzo3bv/H6epNguz6FiZSDyg
Malware Config
Extracted
formbook
4.1
cy30
viveksirclass.com
lotuscounselingsc.com
thompsonlaws.com
theinterviewworkout.biz
brofjoc.online
euheimr.net
dealresort.xyz
betforwar.com
tayogas.com
redhotcellopeppers.com
shoujigushi.com
jounan-lp.com
womensminitournaments.com
003523.com
fuyeku.com
powerenergyshop.com
99334633.xyz
army-construccion.com
superiorpipemaintenance.com
clientpods.com
wasatchaqua.com
eormerod.co.uk
gvmb.info
opendoorways-counseling.com
5000wg.com
kdsgardenmachinery.uk
liangoeco.online
mencrypt.com
vegebased.com
nisrinaidak.com
acllab.tech
diabetictrack.com
debuggerror.site
wlyfgj.com
civilsiteeenv.com
monkeymagic.store
aigrarage.com
yeisonjimenezla.com
cheek-offers.com
yilinglab.com
newserwis.com
texashillsandlakes.site
llcanalytics.com
noveltyfitness01.com
projectrepre.com
theromanoteam6.net
xilljpme.top
tianjincelue06.com
irsvending.co.uk
seniorhalsan.com
hvacinsanjoseca.com
karlkarlstad.com
vuongpheanchuahong.xyz
lfcphx.net
amcam.info
darth-bane.com
mylezbeautystore.com
xcnie.com
ttllio.com
arelfleet.online
securemyeddcard.com
moverscommunity.com
guiadecoracao.com
tahoetabletops.com
ouickly.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1248-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1248-64-0x000000000041F070-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1248 c2724b5bece3913584ce76a11e2b6414.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27 PID 1732 wrote to memory of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27 PID 1732 wrote to memory of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27 PID 1732 wrote to memory of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27 PID 1732 wrote to memory of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27 PID 1732 wrote to memory of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27 PID 1732 wrote to memory of 1248 1732 c2724b5bece3913584ce76a11e2b6414.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-