Analysis
-
max time kernel
180s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:12
Static task
static1
Behavioral task
behavioral1
Sample
ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe
Resource
win7-20221111-en
General
-
Target
ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe
-
Size
631KB
-
MD5
4f9200c489a9fe2be198fc29f99dc23d
-
SHA1
8e890ec88655d62985ad10855c95fa5e5c096d61
-
SHA256
ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875
-
SHA512
71e0cce3a819bc9f9072258fb8ce2bddb99a295fa040b8f7fb492723109546cabb8970139e191e9e71fadfb1bc1c1e58deec2fc99dc80ac88c75c2890afe3fd3
-
SSDEEP
12288:+AL7KcWiCvp4SwsnBuiECuTq11kV7wTa/yZ901uENlurBB:rL7Khpb1ECuLMSyZ9MXNl
Malware Config
Extracted
formbook
4.1
kakv
toilysoncaocap.com
luisxe.info
casinor.xyz
ab3262.com
milanoise.com
ikeedojoja.net
fix-pert.com
relocatingland.com
brewskymc.com
eftmississippi.com
helpmewithmyenergy.com
ctuppo.com
loyolalabschool.com
brainstormoutlet.com
merlindeppeler.com
sjditsolutions.tech
smiletakuhai.com
recovatek.com
pyonkichim78.com
scvs.site
agncloud.com
folostyles.com
coffeenewssiouxfalls.net
abeldrivingschool.com
4018398.com
irraud.club
handmtk.com
policanosfoodanddrink.com
hkxs99.com
ksjblsp.com
bettinghuayhunnikkei.com
baggh.com
crimsonyardcandles.com
steveulin.com
arbystar.com
abbyscoffeesocial.com
money89ch.com
adsandlinks.com
prettygirlforex.com
acxcrypto.com
gate6beautysupply.com
my-emissions.com
elewintool.com
futureshop4u.com
interfacefire.com
365malerevue.net
fivestarhacker.com
yoshiobuppan.com
taipingservice.net
houstoncouplesthatcycle.com
andronomicon.com
shirts-365.com
autoplusdfw.com
bardstownconnector.com
t3dasa.net
spatialdesign.ink
focusapparelco.com
fangtrades.com
lab-wealth.com
technicalbusinessstrategies.com
theadvertisinglab.com
liberatulimite.com
methodcleaningservice.com
daiyosi.com
legarageksa.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1796-138-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exedescription pid process target process PID 220 set thread context of 1796 220 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exepid process 1796 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe 1796 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exedescription pid process target process PID 220 wrote to memory of 1796 220 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe PID 220 wrote to memory of 1796 220 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe PID 220 wrote to memory of 1796 220 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe PID 220 wrote to memory of 1796 220 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe PID 220 wrote to memory of 1796 220 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe PID 220 wrote to memory of 1796 220 ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe"C:\Users\Admin\AppData\Local\Temp\ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe"C:\Users\Admin\AppData\Local\Temp\ab4aa8ad802b02869eaea9832e919459f3d0f320d23e95589a14bd16d8c52875.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-