Analysis
-
max time kernel
299s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 08:12
Static task
static1
Behavioral task
behavioral1
Sample
Roominglist.exe
Resource
win7-20220812-en
General
-
Target
Roominglist.exe
-
Size
56KB
-
MD5
33cb940f9ffa1caaf6e4bfbe34f20ace
-
SHA1
1feeae415133b70c095a6403620f498b4eeb48c1
-
SHA256
6c1aa92f10b53b678585205a87e2a64daab99b685f97955582f89f89743048fd
-
SHA512
da25ba7d05fb283cb5eb8047afc68f626aa6876ae7a64d3f93b6460ec0483c57f682468e7852254b4e8dced65774d956cd91ffff1b19a4764eadd434e078dfb1
-
SSDEEP
1536:20ipga/eHUTQQQQQQQBdBgN6b5/2kWSC6WLr4HDvas:9ipga/eHUTQQQQQQkdBft/2YWLr4HDys
Malware Config
Extracted
formbook
4.1
ee05
xn--ekro31fyrpxa.xn--55qx5d
gxttgfjj.buzz
lojaoutletbuscape.com
xianhewan.net
courtreporter.news
yzjhxly.com
mammaminimalista.com
oilfieldoriginals.net
sxptraining.com
balajicracker.com
womeninfinance101.website
yourcustomclothes.store
22487.site
zxznkjgs.com
devonbikeshack.bike
supratechnologyinc.com
ganbun.click
ronstarow.shop
sanderborst.space
cyberlabisc.online
sriyantinaturaworld.com
adumoxing.top
silvacomtech.com
pftc.life
exponentialpower-inc.net
lanniaonode.xyz
gaolezibenaa.xyz
michellefarmerart.com
ejhmnf.com
blend-3311.xyz
orbitiesco.com
cevlmes.online
servabiwak.net
renegadecopy.net
wuys11.top
minimum.limited
hr3v31fbd.top
overwin.website
cereyan.net
mesf.top
flytic.xyz
angeltouch.xyz
coverbell.com
ayhereabit.xyz
roc1.top
1885ly.com
adizes.business
wispconstruction.com
ursiastrology.com
pet-goods.store
kgnsoftsolutions.com
konefals.online
fleetoffset.shop
kidsdentistinlewisville.com
dihanggroup.com
crhu.rest
canyoufuckme.com
jtpmoving.com
funds.wales
solveseduce.top
studioarchadroit.com
afsnn.com
nongnghiepsach.store
robotics1.online
rollerdigest.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1508-135-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1508-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4596-145-0x0000000000770000-0x000000000079F000-memory.dmp formbook behavioral2/memory/4596-148-0x0000000000770000-0x000000000079F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2344 set thread context of 1508 2344 Roominglist.exe 83 PID 1508 set thread context of 980 1508 aspnet_compiler.exe 49 PID 4596 set thread context of 980 4596 wscript.exe 49 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 Roominglist.exe 2344 Roominglist.exe 1508 aspnet_compiler.exe 1508 aspnet_compiler.exe 1508 aspnet_compiler.exe 1508 aspnet_compiler.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe 4596 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 980 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1508 aspnet_compiler.exe 1508 aspnet_compiler.exe 1508 aspnet_compiler.exe 4596 wscript.exe 4596 wscript.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2344 Roominglist.exe Token: SeDebugPrivilege 1508 aspnet_compiler.exe Token: SeDebugPrivilege 4596 wscript.exe Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE Token: SeShutdownPrivilege 980 Explorer.EXE Token: SeCreatePagefilePrivilege 980 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 980 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2164 2344 Roominglist.exe 82 PID 2344 wrote to memory of 2164 2344 Roominglist.exe 82 PID 2344 wrote to memory of 2164 2344 Roominglist.exe 82 PID 2344 wrote to memory of 1508 2344 Roominglist.exe 83 PID 2344 wrote to memory of 1508 2344 Roominglist.exe 83 PID 2344 wrote to memory of 1508 2344 Roominglist.exe 83 PID 2344 wrote to memory of 1508 2344 Roominglist.exe 83 PID 2344 wrote to memory of 1508 2344 Roominglist.exe 83 PID 2344 wrote to memory of 1508 2344 Roominglist.exe 83 PID 980 wrote to memory of 4596 980 Explorer.EXE 84 PID 980 wrote to memory of 4596 980 Explorer.EXE 84 PID 980 wrote to memory of 4596 980 Explorer.EXE 84 PID 4596 wrote to memory of 2848 4596 wscript.exe 88 PID 4596 wrote to memory of 2848 4596 wscript.exe 88 PID 4596 wrote to memory of 2848 4596 wscript.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Roominglist.exe"C:\Users\Admin\AppData\Local\Temp\Roominglist.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:2164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:2848
-
-