Analysis
-
max time kernel
50s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 15:57
Static task
static1
Behavioral task
behavioral1
Sample
1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe
Resource
win7-20220901-en
General
-
Target
1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe
-
Size
939KB
-
MD5
b2ef30fb8a6e2116cf13adbd70218768
-
SHA1
66903823fc9f8f6acc93e60e18722520483a8074
-
SHA256
1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5
-
SHA512
8bc5fc4a1c868b10418873062646d0d091f95a26324981d4e702ace4dad2274c6a110fdae7e126c6007c30afc1e6ab4cc873d0dfc0b0a9dfff80e0eb8918e33d
-
SSDEEP
12288:0fEWcBeEn21z+7fM34NMjlbxpanIYVvxUTZu1UFDqB5Gbgnda9LY2uw:AEvBhn2d1huIYfTsDy5GbgndS
Malware Config
Extracted
formbook
4.1
jr16
chinmayresort.com
beemine.site
jokihoki.net
spectrum-art.com
lchaxmm.top
garenobizzo.xyz
821riverknoll.com
bluelevelmusic.com
livingroomhotels.com
hilmiozsoysigorta.com
xsgdd.com
rozvezuto.online
inter-ac.online
discotecheitalia.com
judder.xyz
arlington425.site
cn-sk.com
axelarigatomanila.com
qqwe89.site
accography.com
varyapnakliye.com
aussiewholesalefurniture.online
trendsymptoms.website
melagenin.store
trendylytical.com
moldinspectscottsdale.online
acrnel.com
americanfreedomfair.com
cryptonantucket.com
themothertouch.com
persence.com
lisagdasmith.space
paring-deification.net
fakgop.online
siweipackage.com
quangtiengia.net
beyazkaro.xyz
themixedwrestlinggroup.com
417783.sbs
labonephoto.com
dfsdfe.site
speranzawinery.com
tope-manciple.net
all41radio.com
xn--sx-eja.com
after-ex.com
geosierraenv.online
3dfoe.com
jennybeautys.com
326doak.info
churchmedic.com
passgroup.sbs
soikeonhacai.net
bezpobochek.online
financialclan.pro
caspook.com
trickeymoose.com
abbeywoodlodge.com
senior1.site
automoversofny.com
jewelshow.top
xiaoxiao.life
ukgiant.com
kimaspromosyon.xyz
rocketkit.space
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1168-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1168-64-0x000000000041F120-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1168 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27 PID 1768 wrote to memory of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27 PID 1768 wrote to memory of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27 PID 1768 wrote to memory of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27 PID 1768 wrote to memory of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27 PID 1768 wrote to memory of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27 PID 1768 wrote to memory of 1168 1768 1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe"C:\Users\Admin\AppData\Local\Temp\1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe"C:\Users\Admin\AppData\Local\Temp\1fa440f5e55258c7787165a37d50587cef16558e9734f44b3fb8a194ab38e7d5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-