Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
c1d74ec41c57e24503bb5f05117a0215.exe
Resource
win7-20220901-en
General
-
Target
c1d74ec41c57e24503bb5f05117a0215.exe
-
Size
873KB
-
MD5
c1d74ec41c57e24503bb5f05117a0215
-
SHA1
47bd6a606edd6229962526f5488c5c8635acc50e
-
SHA256
ab380ec497114c124eaabbb96f643cb20dfb24d0618be4934c19c4062f82fa71
-
SHA512
43ab24a193c2c5698c4a6d5fb6122f29204109dd608c1bd936be5104f2da29d3996cfdf6b20cbfc2d83559f0b2691f6f6dd9d098fc0ef4710b0e0b5997249bbf
-
SSDEEP
12288:Rqh702iNpEmR/B4C0UW6Tggk3PuhB4QJP1vwY1LFUFWs8JTEc72d/DW7UKt:d1BWU7ggnhfrvwY15UIDhAg
Malware Config
Extracted
formbook
4.1
hn73
medusaams.com
ekyas.com
deadandcompanyindianapolis.net
winnersclub.live
gozero.buzz
sdmfeh.xyz
rikfiri.com
happyworld.tech
oculusquest2linkcable.com
cksexdoll.top
aitechconsulting.net
prstampsevery.shop
kioskdz.com
fogg.productions
7gu7x5mc.com
thefactoryco.com
dvsmanpowerenterprises.com
dreamwins5.com
bgs-abogados.com
arthursouza.online
bxtopyumer.top
xx8g405.top
top20liberia.com
a1p5.cyou
durableshippingcontainers.com
pyxhi.xyz
eaglesolebuildings.com
panache-qatar.com
ghiencf.com
precist129.fun
beautisoleshoetique.com
ttttttttdsb-sgghdjj.xyz
thenewrakutenjpcardmail.top
yiqunyanyu.com
wedaplv.com
brawlkingz.com
infinatelighting.com
sef-a73gshbyey.kred
laguiadezafra.com
acsintegral.com
xn--gioonline-m6a.com
4f0nfdbmot559s.kred
fatashow.com
kefiiboutique.store
yetkilisi.site
weisswein.vip
drt6g85t.cfd
renderbet202.com
brownshed.net
juodwb.xyz
epiceriemarket.com
687yrx-a7a7ia6et-2.site
deardvd.com
healthpatches.store
evereffect.email
vipfootball.shop
bk3wkhteil.vip
wzbmilenium.com
stefan-rex.com
turksonair.com
popleggings.shop
sometimesthechurchgetupinme.com
dalast.com
jxmghb.com
23votingspree.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/668-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/668-64-0x000000000041F120-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 992 set thread context of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 668 c1d74ec41c57e24503bb5f05117a0215.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 992 wrote to memory of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27 PID 992 wrote to memory of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27 PID 992 wrote to memory of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27 PID 992 wrote to memory of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27 PID 992 wrote to memory of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27 PID 992 wrote to memory of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27 PID 992 wrote to memory of 668 992 c1d74ec41c57e24503bb5f05117a0215.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d74ec41c57e24503bb5f05117a0215.exe"C:\Users\Admin\AppData\Local\Temp\c1d74ec41c57e24503bb5f05117a0215.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\c1d74ec41c57e24503bb5f05117a0215.exe"C:\Users\Admin\AppData\Local\Temp\c1d74ec41c57e24503bb5f05117a0215.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-