Analysis
-
max time kernel
55s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 19:22
Static task
static1
Behavioral task
behavioral1
Sample
27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe
Resource
win7-20220812-en
General
-
Target
27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe
-
Size
988KB
-
MD5
1af8f4ac0eb2cde05f545828c3f9f04f
-
SHA1
7a6882b53d98889f815e2eae79a478cb4e6b22d4
-
SHA256
27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162
-
SHA512
2906e8dbb7b6859a156bafa01d3d07de50a84173519933c63c1066dd9124ca595e716d710f7b21ae07a21136c9a296c8bde1b2c0fdc41ace3b30ce942818557b
-
SSDEEP
12288:ur1cA2iNaxfvX1QmLIf5hjKEM17GQ7F9cmLy0HAgwpsJDWhqWfu:A1S1wbKr7bcKesJChBf
Malware Config
Extracted
formbook
4.1
p94a
wishgrove.com
parqueveiculos.com
spiderwebs.online
chulkanadham.com
cdtuan.net
zxazm.com
payment6528832.xyz
fengtaiol.com
bffsmovie.com
aliceseagerfitness.com
garisluruskonsulindo.website
analytical-gutter.net
ahcq8.com
fenyoga.com
ecleptic.cat
conjurecrafts.com
aquaway.date
apenpokkenschoonmaakbedrijf.com
zgramr.top
boweknives.site
wf825.com
tonysdiary.com
alttxt.space
digz.us
mailim.xyz
chromebarbangkok.com
toyookahana.com
jornalaquadra.net
cloudpackages.online
xfew.top
atherenergy.uk
allentownfilmcrew.com
gym323.com
ballbyball.online
youyiw.com
mehdifarzi.com
dinobro.com
bonanzapratamaabadi.com
trailer.vegas
retro241.space
ecole-universite.com
magentodesigndublin.com
ilovechutney.info
451338.com
vintagewriting.site
008420.com
sussexfoodie.co.uk
matrix-101.com
carolina3dproperties.com
clairecorrie.co.uk
asafosa.xyz
yashpestcontrol.com
keilewn.online
nirmalmirchandani.com
familyibis.sbs
anthropologybythewire.com
invidgekets.xyz
1stconstiution.com
byxre.com
andresraiter.com
1stpartynft.com
25thdayoffer.xyz
nicehaus.space
mhjys.com
muuritutkimus.info
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1904-64-0x000000000041F0F0-mapping.dmp formbook behavioral1/memory/1904-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exedescription pid process target process PID 968 set thread context of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exepid process 1904 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exedescription pid process target process PID 968 wrote to memory of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe PID 968 wrote to memory of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe PID 968 wrote to memory of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe PID 968 wrote to memory of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe PID 968 wrote to memory of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe PID 968 wrote to memory of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe PID 968 wrote to memory of 1904 968 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe 27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe"C:\Users\Admin\AppData\Local\Temp\27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe"C:\Users\Admin\AppData\Local\Temp\27f2087a1eb0f0ad0178f59eb8924ead92b1104132ed638897fca915c7e5c162.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/968-54-0x0000000000E60000-0x0000000000F5E000-memory.dmpFilesize
1016KB
-
memory/968-55-0x0000000076831000-0x0000000076833000-memory.dmpFilesize
8KB
-
memory/968-56-0x00000000002B0000-0x00000000002C8000-memory.dmpFilesize
96KB
-
memory/968-57-0x00000000002E0000-0x00000000002EC000-memory.dmpFilesize
48KB
-
memory/968-58-0x0000000004E40000-0x0000000004ED0000-memory.dmpFilesize
576KB
-
memory/968-59-0x0000000000CF0000-0x0000000000D24000-memory.dmpFilesize
208KB
-
memory/1904-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1904-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1904-64-0x000000000041F0F0-mapping.dmp
-
memory/1904-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1904-65-0x0000000000880000-0x0000000000B83000-memory.dmpFilesize
3.0MB