Analysis
-
max time kernel
64s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
29-11-2022 06:44
Static task
static1
General
-
Target
e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe
-
Size
913KB
-
MD5
7b6dcd6fcd1c26b9abdba167929f4c82
-
SHA1
04f11f07ef4a51b16383b5dde94f1af405893b45
-
SHA256
e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9
-
SHA512
0a12c658607c69b203f3674a6097b86b925e29d00003b4e1c975e5bd09894eba722af22ced22c0c01ca555657eaa7251a908f36e0fabfe2f521aad9124d6b942
-
SSDEEP
12288:pe+QDdzoa1cfNv+/O/OW9HiiwdIvL94CsAH0vJHlAMMLOV8SWRdXZIQFhZMRR3im:qDdEPflOO/OW9CkL9/fDxiMR/phUz
Malware Config
Extracted
formbook
4.1
b3es
sweets.wtf
apextama.com
tygbs.com
kumaoedu.com
bestbathroomremodeling.club
lnshykj.com
nelsonanddima.com
falunap.info
codyhinrichs.com
2797vip.com
danutka.com
3o2t307a.com
kellymariewest.com
profilelonn.online
procan.website
sopjimmy.com
xn--skdarkae-55ac80i.net
entitymanaged.com
melitadahl.art
joineguru.net
good-meme.com
creditconepts.com
narafconstruction.com
paspsichologa.com
rancho365.com
rimplefeel.com
kingsub.online
cnsrdns.com
billythepainter.com
clientevirtualpdf.net
marycruzruiz.com
renaultcikmaparca.xyz
1600156.com
paymallmart.info
garafe.com
fredrikk.net
gogo-tunisia.space
center-me.com
xiaohuayhq.com
xn--h49a60xt7azzcm91a.com
unidiliobobo.info
libertypolestore.com
20111210.net
atraofix.online
furniron.com
mingyun58.com
shfesmua.com
rdougdigital.life
safsip.com
melon.town
sagihigaibengo.net
ethnicsbyak.com
designoffaitheventsllc.com
dpmforensics.com
ripple-us.net
fuyouhin-happiness.com
conceptweb.online
l453.net
zenars.com
mepcoonlinebill.com
oonn99.xyz
dackus.energy
articvas.com
yayuanlin.com
imperiumtowns.xyz
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1988-187-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1988-188-0x000000000041F0F0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exedescription pid process target process PID 2452 set thread context of 1988 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exee38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exepid process 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe 1988 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe 1988 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exedescription pid process Token: SeDebugPrivilege 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exedescription pid process target process PID 2452 wrote to memory of 1988 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe PID 2452 wrote to memory of 1988 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe PID 2452 wrote to memory of 1988 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe PID 2452 wrote to memory of 1988 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe PID 2452 wrote to memory of 1988 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe PID 2452 wrote to memory of 1988 2452 e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe"C:\Users\Admin\AppData\Local\Temp\e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe"C:\Users\Admin\AppData\Local\Temp\e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1988-187-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1988-188-0x000000000041F0F0-mapping.dmp
-
memory/1988-189-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/1988-190-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/1988-191-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/1988-195-0x0000000000C40000-0x0000000000F60000-memory.dmpFilesize
3.1MB
-
memory/2452-149-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-124-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-121-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-122-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-123-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-154-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-125-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-126-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-127-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-155-0x0000000005D20000-0x000000000621E000-memory.dmpFilesize
5.0MB
-
memory/2452-129-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-130-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-131-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-132-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-133-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-134-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-135-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-136-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-137-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-138-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-139-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-140-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-141-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-142-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-143-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-144-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-145-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-146-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-147-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-148-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-119-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-150-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-151-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-152-0x0000000000D50000-0x0000000000E3A000-memory.dmpFilesize
936KB
-
memory/2452-183-0x00000000012E0000-0x00000000012EE000-memory.dmpFilesize
56KB
-
memory/2452-120-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-128-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-156-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-157-0x00000000056C0000-0x0000000005752000-memory.dmpFilesize
584KB
-
memory/2452-158-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-159-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-160-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-161-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-162-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-163-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-164-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-165-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-166-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-167-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-168-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-169-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-170-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-171-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-172-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-173-0x0000000005660000-0x000000000566A000-memory.dmpFilesize
40KB
-
memory/2452-174-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-175-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-176-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-177-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-178-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-179-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-180-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-181-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-118-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-182-0x0000000005CE0000-0x0000000005CF6000-memory.dmpFilesize
88KB
-
memory/2452-153-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-184-0x0000000007D00000-0x0000000007DAA000-memory.dmpFilesize
680KB
-
memory/2452-185-0x0000000007DB0000-0x0000000007E4C000-memory.dmpFilesize
624KB
-
memory/2452-186-0x0000000001710000-0x0000000001782000-memory.dmpFilesize
456KB