Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2022 15:34
Static task
static1
Behavioral task
behavioral1
Sample
c2724b5bece3913584ce76a11e2b6414.exe
Resource
win7-20220812-en
General
-
Target
c2724b5bece3913584ce76a11e2b6414.exe
-
Size
899KB
-
MD5
c2724b5bece3913584ce76a11e2b6414
-
SHA1
dd65c490d2e5ea690a3522e680169e1c748ad605
-
SHA256
0edf2a0a4fe852db8050d58c5698b71b14a8346022eccc5180f5acd0378a9966
-
SHA512
cfe497fef745d9e2f59889cf95019187179e55ae89dcc44b0078b44229d95e1712b29d42facd7e1c9851e5a6a3257dc4756ac2b6e0dc1709f1c173429fb9d8cf
-
SSDEEP
12288:yHF75eSgPwqoXY+mzoRtbvRT75yzcv6Fe5pNtSuz6FbIo0fRw1hDs/7bDI:0Z5LXY+mzo3bv/H6epNguz6FiZSDyg
Malware Config
Extracted
formbook
4.1
cy30
viveksirclass.com
lotuscounselingsc.com
thompsonlaws.com
theinterviewworkout.biz
brofjoc.online
euheimr.net
dealresort.xyz
betforwar.com
tayogas.com
redhotcellopeppers.com
shoujigushi.com
jounan-lp.com
womensminitournaments.com
003523.com
fuyeku.com
powerenergyshop.com
99334633.xyz
army-construccion.com
superiorpipemaintenance.com
clientpods.com
wasatchaqua.com
eormerod.co.uk
gvmb.info
opendoorways-counseling.com
5000wg.com
kdsgardenmachinery.uk
liangoeco.online
mencrypt.com
vegebased.com
nisrinaidak.com
acllab.tech
diabetictrack.com
debuggerror.site
wlyfgj.com
civilsiteeenv.com
monkeymagic.store
aigrarage.com
yeisonjimenezla.com
cheek-offers.com
yilinglab.com
newserwis.com
texashillsandlakes.site
llcanalytics.com
noveltyfitness01.com
projectrepre.com
theromanoteam6.net
xilljpme.top
tianjincelue06.com
irsvending.co.uk
seniorhalsan.com
hvacinsanjoseca.com
karlkarlstad.com
vuongpheanchuahong.xyz
lfcphx.net
amcam.info
darth-bane.com
mylezbeautystore.com
xcnie.com
ttllio.com
arelfleet.online
securemyeddcard.com
moverscommunity.com
guiadecoracao.com
tahoetabletops.com
ouickly.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1000-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 1000 2264 c2724b5bece3913584ce76a11e2b6414.exe 96 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2264 c2724b5bece3913584ce76a11e2b6414.exe 2264 c2724b5bece3913584ce76a11e2b6414.exe 1000 c2724b5bece3913584ce76a11e2b6414.exe 1000 c2724b5bece3913584ce76a11e2b6414.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2264 c2724b5bece3913584ce76a11e2b6414.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2192 2264 c2724b5bece3913584ce76a11e2b6414.exe 95 PID 2264 wrote to memory of 2192 2264 c2724b5bece3913584ce76a11e2b6414.exe 95 PID 2264 wrote to memory of 2192 2264 c2724b5bece3913584ce76a11e2b6414.exe 95 PID 2264 wrote to memory of 1000 2264 c2724b5bece3913584ce76a11e2b6414.exe 96 PID 2264 wrote to memory of 1000 2264 c2724b5bece3913584ce76a11e2b6414.exe 96 PID 2264 wrote to memory of 1000 2264 c2724b5bece3913584ce76a11e2b6414.exe 96 PID 2264 wrote to memory of 1000 2264 c2724b5bece3913584ce76a11e2b6414.exe 96 PID 2264 wrote to memory of 1000 2264 c2724b5bece3913584ce76a11e2b6414.exe 96 PID 2264 wrote to memory of 1000 2264 c2724b5bece3913584ce76a11e2b6414.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"2⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"C:\Users\Admin\AppData\Local\Temp\c2724b5bece3913584ce76a11e2b6414.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-