Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-09-2022 14:27
Static task
static1
Behavioral task
behavioral1
Sample
EFT Payment 27September.exe
Resource
win7-20220901-en
General
-
Target
EFT Payment 27September.exe
-
Size
426KB
-
MD5
99128801351b81b164690fb32ddfe74f
-
SHA1
f8f2a0beaf18ce9311ada5ae7fd8dde3914771de
-
SHA256
fac949564f4665701edaee8c5228133b6c84842fef319a82e8909ddeaa215de6
-
SHA512
22a6f3d58634d462fd4281dbe2b975df010056bf2b385be110256430289d198640422f0a149607ad72d331bd34cf769fb09d80d22b05da4817d6d1c6db2f91bb
-
SSDEEP
6144:EKTmSHR5ZwZv+Wxt5+3GE4msba3k4kwsEYA8Ki:XT/x5Zw1+WlA2Vb4kJbEYu
Malware Config
Extracted
formbook
4.1
tg49
497338.com
shoptickr.win
support.academy
cloud123.top
manhattanmaintenance.site
sustainabilityblock.com
mertbnkae.city
letshookup.site
aqiqahkarawang.site
play-demoslot-coktogel.app
taikatarot.info
insanxarakterleri.com
bobdoessport.co
inexecution-oarsman.net
aspirationit.com
88bet2255.com
northbowlodge.com
downjc.com
diecastcoin.site
pubiliweb.com
greatneckplaza.site
glowitt.com
marimenang.xyz
2ridgemoor.com
tf1938.xyz
mahmutogluinsaat.com
vanguard-vanguard.com
veronaroad.info
aldwickmeanclean.co.uk
darihobi.com
americafirsthellpteam01.me
butlerbobo.app
15ke.net
8888888.ltd
ipcommit.com
revolutionizeyourrevenue.com
aiweu.com
findlearn.net
visionfootball.info
putkimiessalo.info
diabetesequiment.tech
comprarfunkopop.info
fastfix.app
bjyart.com
alternafest.com
offerstream-2.za.com
bellecoo.com
gasbanor.online
veganrebels.uk
quannhu.ltd
agddistribuidora.com
thimopi-conduite.com
dallastexasmediation.com
asesoriaenbarcelona.pro
slimebeats.com
sylkynsora.com
incontactapp.co.uk
caminovacations.com
bets-bc-utuas.xyz
chamberofscientists.com
hart-oca.xyz
selfcareopedia.co.uk
soulsolutions.tech
hameenmaalampo.com
doge-miner.site
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2028-61-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2028-62-0x000000000041F130-mapping.dmp formbook behavioral1/memory/2028-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1072-70-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1072-76-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1128 set thread context of 2028 1128 EFT Payment 27September.exe 27 PID 2028 set thread context of 1284 2028 aspnet_compiler.exe 13 PID 1072 set thread context of 1284 1072 systray.exe 13 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2028 aspnet_compiler.exe 2028 aspnet_compiler.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe 1072 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1284 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2028 aspnet_compiler.exe 2028 aspnet_compiler.exe 2028 aspnet_compiler.exe 1072 systray.exe 1072 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2028 aspnet_compiler.exe Token: SeDebugPrivilege 1072 systray.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2028 1128 EFT Payment 27September.exe 27 PID 1128 wrote to memory of 2028 1128 EFT Payment 27September.exe 27 PID 1128 wrote to memory of 2028 1128 EFT Payment 27September.exe 27 PID 1128 wrote to memory of 2028 1128 EFT Payment 27September.exe 27 PID 1128 wrote to memory of 2028 1128 EFT Payment 27September.exe 27 PID 1128 wrote to memory of 2028 1128 EFT Payment 27September.exe 27 PID 1128 wrote to memory of 2028 1128 EFT Payment 27September.exe 27 PID 1284 wrote to memory of 1072 1284 Explorer.EXE 28 PID 1284 wrote to memory of 1072 1284 Explorer.EXE 28 PID 1284 wrote to memory of 1072 1284 Explorer.EXE 28 PID 1284 wrote to memory of 1072 1284 Explorer.EXE 28 PID 1072 wrote to memory of 580 1072 systray.exe 29 PID 1072 wrote to memory of 580 1072 systray.exe 29 PID 1072 wrote to memory of 580 1072 systray.exe 29 PID 1072 wrote to memory of 580 1072 systray.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\EFT Payment 27September.exe"C:\Users\Admin\AppData\Local\Temp\EFT Payment 27September.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:580
-
-