Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 12:10
Static task
static1
Behavioral task
behavioral1
Sample
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe
Resource
win7-20221111-en
General
-
Target
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe
-
Size
368KB
-
MD5
561189349e7ef1918a4c27182a279ca6
-
SHA1
37165c0b5bd29f23664d55e0e4279f89ccde4275
-
SHA256
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e
-
SHA512
96ec8f72b5b031b8724296f620ba3b2e64295da62ae4d56e2d00b84d01bbbe3f3488f51ecdf7ab297b347574783ca4fad1105a1ee5fb97136affa6358c746e55
-
SSDEEP
6144:dt39+IGUiggkeVXZtFz/icY6FBXmyskHrBggUBmefTm2+zNXsl37t:CgWVXZj/XBGyskdgpfT
Malware Config
Extracted
formbook
3.9
ch
dfjz88.com
realtorscreek.com
pl8v5z.info
thicdienthoai.com
areauruguay.com
shimizu-yado.com
apples5.com
hothip.net
jm-legal.online
bkinfo28.online
edificiosakura.net
biodesixlungreflex.com
segurosblanco.com
atsintech.solutions
steuerberaterfinden.com
ojjul.com
udcomputer.com
grovescashflow.com
inglot-jlo.com
docteursnuisible.com
dragonscience.com
fzmyk06.com
yongyingbao.com
paulbak.com
xhtd819.com
brnthz.info
sixteenfoxes.com
afcct-ladiesinredlunch.com
alohaessentialoils.today
peoplearentprops.com
xn--udsw05j.ink
arche-webdesign.com
every-kid.com
gofindit.biz
onebyone.group
kitch.film
pristine.ventures
shippingyoga.com
selfishdeals.com
masakatsugaru.com
thegreat401kripoff.info
0gc2t8.info
cwhqaq.com
nicerack.world
drvandoreva.com
1024ccco.info
mairuizi.com
mixjockey.productions
henichou.com
hoteldealscatcher.com
automobilagent.com
colourfulmalaysia.com
lovethelittle.com
tpcnamway.info
bluewong880519.com
healthylife-confident.com
chibitzer.com
kanbures.reisen
gzxhx168.com
islippostprom.net
stxentertainiment.com
auwed.com
rokoko.design
petitkevin.com
saibez.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5032-140-0x0000000000400000-0x0000000000461000-memory.dmp formbook behavioral2/memory/5032-141-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Drops file in Windows directory 2 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exedescription ioc process File opened for modification C:\Windows\win.ini 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe File opened for modification C:\Windows\win.ini 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 5032 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5032 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5032 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5032 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5032 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5032 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exepid process 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5032 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exedescription pid process target process PID 996 wrote to memory of 5032 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe PID 996 wrote to memory of 5032 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe PID 996 wrote to memory of 5032 996 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe 5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"C:\Users\Admin\AppData\Local\Temp\5d11d75dc9ecba71d33f246f0f277ffec929402f96c132d186a398e6942ffb7e.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06