Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 03:58
Static task
static1
General
-
Target
6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe
-
Size
72KB
-
MD5
6f53598b9c19b30a0cf3ff0432301708
-
SHA1
4bd8e67e468adfbfddd9e5a1e47fdf318bf9a31b
-
SHA256
6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379
-
SHA512
e655648f950b90261fd2b54be1ebfee9780ff466351d1cc4b1a675c41329fc5eae62f20ccb9423d3ee4e3457c7a8ed63b14bc2e30f205a4512122301ce2d1541
-
SSDEEP
1536:7BKK5PX8Q01Hb20oJ0fekpamVGfhCW7j:lKSx0177ouekpamVGfhCW7j
Malware Config
Extracted
formbook
4.1
zx85
myclassly.com
rilcon.xyz
miracleun.shop
gadgetward-usa.com
farmaacademy.com
dreamsolutions.group
fffood.online
ziggnl.site
cherpol.com
imprescriptible-tienoscope.biz
yztc.fun
chicagonftweek.com
zz0659.com
hznaixi.com
027-seo.net
korlekded.com
gelatoitaly.com
finlitguru.com
gupingapp.com
manmakecoffee.com
yuanwei.lol
cargovoyager.com
getjobzz.com
dagatructiephd.com
mynab.mobi
masteralbert.com
rtugwmt0cs.vip
uscanvas.net
nocrytech.com
canadaroi.com
archivegamer.com
crossinspectionservices.com
dxxws.com
rufflyfedogtraining.com
prgrn.dev
bwdcourses.com
criptomexico.com
elisabethingram.online
drationa.shop
pulsarthermalscope.shop
grcpp8vyuk.vip
sh-whyyl.com
in-cdn.xyz
aquatabdouro.online
handsomeshooterjewelry.com
erug.store
trueimpact.studio
taskalso.com
dzslqdz.xyz
barbushing.com
freightxpert.com
777703.xyz
bradysproducts.com
teensforcp.site
gpssystemecuador.com
luxslides.com
sony8ktv.monster
baxiservisim.xyz
lojascacau.com
sfanci.com
magdrade.com
jobreadyfresher.com
dori-maniacs.com
mercydm.mobi
ept-egy.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/4752-134-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/4752-136-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2224-143-0x0000000000AC0000-0x0000000000AEF000-memory.dmp formbook behavioral1/memory/2224-147-0x0000000000AC0000-0x0000000000AEF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4800 set thread context of 4752 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe 83 PID 4752 set thread context of 2212 4752 aspnet_compiler.exe 42 PID 2224 set thread context of 2212 2224 NETSTAT.EXE 42 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2224 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4752 aspnet_compiler.exe 4752 aspnet_compiler.exe 4752 aspnet_compiler.exe 4752 aspnet_compiler.exe 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE 2224 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4752 aspnet_compiler.exe 4752 aspnet_compiler.exe 4752 aspnet_compiler.exe 2224 NETSTAT.EXE 2224 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe Token: SeDebugPrivilege 4752 aspnet_compiler.exe Token: SeDebugPrivilege 2224 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4752 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe 83 PID 4800 wrote to memory of 4752 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe 83 PID 4800 wrote to memory of 4752 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe 83 PID 4800 wrote to memory of 4752 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe 83 PID 4800 wrote to memory of 4752 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe 83 PID 4800 wrote to memory of 4752 4800 6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe 83 PID 2212 wrote to memory of 2224 2212 Explorer.EXE 84 PID 2212 wrote to memory of 2224 2212 Explorer.EXE 84 PID 2212 wrote to memory of 2224 2212 Explorer.EXE 84 PID 2224 wrote to memory of 4960 2224 NETSTAT.EXE 85 PID 2224 wrote to memory of 4960 2224 NETSTAT.EXE 85 PID 2224 wrote to memory of 4960 2224 NETSTAT.EXE 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe"C:\Users\Admin\AppData\Local\Temp\6d3397c687aea5017b90a5e96adc6fbfb0429d56a8b2ead1f1d4273994952379.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:4960
-
-