Analysis
-
max time kernel
6s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 12:10
Static task
static1
Behavioral task
behavioral1
Sample
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe
Resource
win7-20221111-en
General
-
Target
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe
-
Size
368KB
-
MD5
561189349e7ef1918a4c27182a279ca6
-
SHA1
37165c0b5bd29f23664d55e0e4279f89ccde4275
-
SHA256
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e
-
SHA512
96ec8f72b5b031b8724296f620ba3b2e64295da62ae4d56e2d00b84d01bbbe3f3488f51ecdf7ab297b347574783ca4fad1105a1ee5fb97136affa6358c746e55
-
SSDEEP
6144:dt39+IGUiggkeVXZtFz/icY6FBXmyskHrBggUBmefTm2+zNXsl37t:CgWVXZj/XBGyskdgpfT
Malware Config
Extracted
formbook
3.9
ch
dfjz88.com
realtorscreek.com
pl8v5z.info
thicdienthoai.com
areauruguay.com
shimizu-yado.com
apples5.com
hothip.net
jm-legal.online
bkinfo28.online
edificiosakura.net
biodesixlungreflex.com
segurosblanco.com
atsintech.solutions
steuerberaterfinden.com
ojjul.com
udcomputer.com
grovescashflow.com
inglot-jlo.com
docteursnuisible.com
dragonscience.com
fzmyk06.com
yongyingbao.com
paulbak.com
xhtd819.com
brnthz.info
sixteenfoxes.com
afcct-ladiesinredlunch.com
alohaessentialoils.today
peoplearentprops.com
xn--udsw05j.ink
arche-webdesign.com
every-kid.com
gofindit.biz
onebyone.group
kitch.film
pristine.ventures
shippingyoga.com
selfishdeals.com
masakatsugaru.com
thegreat401kripoff.info
0gc2t8.info
cwhqaq.com
nicerack.world
drvandoreva.com
1024ccco.info
mairuizi.com
mixjockey.productions
henichou.com
hoteldealscatcher.com
automobilagent.com
colourfulmalaysia.com
lovethelittle.com
tpcnamway.info
bluewong880519.com
healthylife-confident.com
chibitzer.com
kanbures.reisen
gzxhx168.com
islippostprom.net
stxentertainiment.com
auwed.com
rokoko.design
petitkevin.com
saibez.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-63-0x0000000000400000-0x0000000000461000-memory.dmp formbook behavioral1/memory/1968-64-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exedescription pid process target process PID 1996 set thread context of 1968 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Drops file in Windows directory 2 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exedescription ioc process File opened for modification C:\Windows\win.ini 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe File opened for modification C:\Windows\win.ini 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 1968 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 1968 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 1968 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 1968 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 1968 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 1968 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exedescription pid process target process PID 1996 wrote to memory of 1968 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe PID 1996 wrote to memory of 1968 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe PID 1996 wrote to memory of 1968 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe PID 1996 wrote to memory of 1968 1996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\win.iniFilesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
memory/1968-57-0x0000000000000000-mapping.dmp
-
memory/1968-63-0x0000000000400000-0x0000000000461000-memory.dmpFilesize
388KB
-
memory/1968-64-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1968-67-0x0000000000580000-0x0000000000588000-memory.dmpFilesize
32KB
-
memory/1968-69-0x0000000076F60000-0x0000000077036000-memory.dmpFilesize
856KB
-
memory/1968-68-0x0000000076D70000-0x0000000076F19000-memory.dmpFilesize
1.7MB
-
memory/1968-70-0x000000001F9E0000-0x000000001FCE3000-memory.dmpFilesize
3.0MB
-
memory/1996-56-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/1996-62-0x00000000004C0000-0x00000000004C8000-memory.dmpFilesize
32KB
-
memory/1996-65-0x0000000076D70000-0x0000000076F19000-memory.dmpFilesize
1.7MB
-
memory/1996-66-0x0000000076F50000-0x00000000770D0000-memory.dmpFilesize
1.5MB