Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2022, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
Booking details.exe
Resource
win7-20220812-en
General
-
Target
Booking details.exe
-
Size
1.2MB
-
MD5
64d38a2ad50e4af64d28d9086e36c37d
-
SHA1
11cbfad75d83639e5128c78bf256306751a71299
-
SHA256
edb793d2433f2bcb4651c6576a8f47ff87d258dfaf5a5bf4194701e61f3a6910
-
SHA512
aefe6cb3e9b8eb7707695b30ee610ef5ec41de50a8410cb3252de0f6eb4428d9edb9f64ea9c680327a87b90718e4f5b1307e6dac548026f67c7ff6c375f299b4
-
SSDEEP
12288:f1I41hw4e/ehLrzZ3q469R5bfamxgHc/8mA3GQ9xklET7e0+GwFLJLevHyparGQ7:uL4LJFITamqHc/88Q9xklFG86H1GWv4
Malware Config
Extracted
formbook
4.1
rsea
aylagrey.com
ketoodavoqslim.xyz
foyfoy.ltd
buymistnow.com
ownempire.net
cie-revolver.com
kedaimks.com
rockbettergear.com
luminousfadel.com
universalbumpkeys.com
enjoyablestopnshop.com
grandesfinanzas.com
professionmessaging.com
thtoughthenight.com
conservativesshop.com
jimihoodie.com
nhlove.net
agentsheila.com
tilemarkng.com
94ei6mgy.com
www69188q.com
dominiclis.com
xinlanyuan.net
stipclub.com
educaterealestatepodcast.com
yourinsuranceconnection.life
imanicarton.com
dongxijiangpin.com
finanziariaruscelli.com
ashleyryannestreet.com
artbynadiaxel.com
delicioushq.com
chunqi888.top
ghjan.com
noyanlarinternational.com
wwgge.com
kiniecta.com
dupreportablebuildings.com
officialcaliyoga.com
stairsuppllies.com
langeculotte.com
celebrateocala.com
wiworwe.xyz
biaolingroup.com
mujid24s.com
jinyida.xyz
mavenpension.com
usreliacares.com
hotelspacasino.com
littycreationz.com
downtownfamilypharmacy.com
koinslot888.tech
almavivaranch.com
downloadmasters.net
heygotrip.com
stake-login.com
secretstation.xyz
lowesy.club
houtai12123.club
epiccaremedtraninc.com
maison-colette.com
andykaufmanisalive.com
bangaloretomysoretaxi.com
casaspecialtycoffee.com
funakelo.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/4500-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4500-145-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4500-149-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2184-152-0x0000000000390000-0x00000000003BF000-memory.dmp formbook behavioral2/memory/2184-156-0x0000000000390000-0x00000000003BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3776 set thread context of 4500 3776 Booking details.exe 97 PID 4500 set thread context of 2864 4500 Booking details.exe 49 PID 4500 set thread context of 2864 4500 Booking details.exe 49 PID 2184 set thread context of 2864 2184 systray.exe 49 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3776 Booking details.exe 3776 Booking details.exe 4500 Booking details.exe 4500 Booking details.exe 4500 Booking details.exe 4500 Booking details.exe 4500 Booking details.exe 4500 Booking details.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe 2184 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4500 Booking details.exe 4500 Booking details.exe 4500 Booking details.exe 4500 Booking details.exe 2184 systray.exe 2184 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3776 Booking details.exe Token: SeDebugPrivilege 4500 Booking details.exe Token: SeDebugPrivilege 2184 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3776 wrote to memory of 2524 3776 Booking details.exe 96 PID 3776 wrote to memory of 2524 3776 Booking details.exe 96 PID 3776 wrote to memory of 2524 3776 Booking details.exe 96 PID 3776 wrote to memory of 4500 3776 Booking details.exe 97 PID 3776 wrote to memory of 4500 3776 Booking details.exe 97 PID 3776 wrote to memory of 4500 3776 Booking details.exe 97 PID 3776 wrote to memory of 4500 3776 Booking details.exe 97 PID 3776 wrote to memory of 4500 3776 Booking details.exe 97 PID 3776 wrote to memory of 4500 3776 Booking details.exe 97 PID 2864 wrote to memory of 2184 2864 Explorer.EXE 102 PID 2864 wrote to memory of 2184 2864 Explorer.EXE 102 PID 2864 wrote to memory of 2184 2864 Explorer.EXE 102 PID 2184 wrote to memory of 4388 2184 systray.exe 103 PID 2184 wrote to memory of 4388 2184 systray.exe 103 PID 2184 wrote to memory of 4388 2184 systray.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Booking details.exe"C:\Users\Admin\AppData\Local\Temp\Booking details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\Booking details.exe"C:\Users\Admin\AppData\Local\Temp\Booking details.exe"3⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\Booking details.exe"C:\Users\Admin\AppData\Local\Temp\Booking details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Booking details.exe"3⤵PID:4388
-
-