Analysis
-
max time kernel
170s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe
Resource
win7-20220812-en
General
-
Target
1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe
-
Size
526KB
-
MD5
53b73e4b80ef2f787b81ef94a9e8a0a9
-
SHA1
59a4562f2eba9df1e56541fe4f0240e77a8f57ce
-
SHA256
1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe
-
SHA512
6afb8a02eaf4f1d52ae63c0a766ad6c7799014aa78c2292ef965978410d6b211ef4abe69dfaa72d2d2d990d7162770996ea3f29540a92b3b29b73887bc9d3b1e
-
SSDEEP
12288:XCT/rgEZ+h8gzlj4kayHe5uvPBD0j1XFumjhUErq1/Uo2IOpgE/oRegM:g/rgZhflj4jy/vPij1XFu4iEm1/UvIOb
Malware Config
Extracted
formbook
3.9
r16
kingshero.net
coinhoue.com
brittanysanddejuanswedding.com
jerseysvipsmall.com
moderneserviezen.com
nyccustody.com
2bj9yzli.biz
azure-documentation.com
alomin1.com
mybluemedsupp.com
cumbera.com
hurricaneirma-claims.com
supportsupportcases.com
safenurses.com
xedxs.com
cosck.net
activekarpaty.com
cbdoilsc.com
kejadigital.com
metalportasbh.com
nawwak.com
oefuhe.info
mysandbox.site
emhlk.com
xn--299ak5x7lgo5dce.com
kzwuci.info
fet-a-casa.com
wingtowndallastx.com
droneroper.com
estherlasryphotography.com
seguimosenconstruccion.info
hurricaneirmacocktail.info
audreysedibles.com
onlinepartsmanual.com
taxidriver666.com
fansiqi.com
castlesincolorado.com
voip-systemzone.rocks
schule24.info
rmcj3v2du.biz
barisemlakyakacik.com
harammm.com
algerie2019.com
gcfarma.com
outstridefitness.com
805man.com
gggg742.com
eurosdna.com
off.juegos
de-light-project.com
teuto.tech
savannahwindermereisland.com
zorgresort.com
d-counsel.com
xn--8mq22xg9wba.net
fit-iam.info
isoqv.com
bizongchou.com
konkstudio.com
weijiaye.com
sophiesonia.com
aoyunhuitouzhu.com
rldint.com
xn--lsvp3nnwol4d.com
lianglinyiyou.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1144-139-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exedescription pid process target process PID 648 set thread context of 1144 648 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exepid process 1144 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe 1144 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exepid process 648 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exedescription pid process target process PID 648 wrote to memory of 1144 648 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe PID 648 wrote to memory of 1144 648 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe PID 648 wrote to memory of 1144 648 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe 1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe"C:\Users\Admin\AppData\Local\Temp\1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exeC:\Users\Admin\AppData\Local\Temp\1e99e3ef6027ed7a0f49f67796042a0ff2b303c120bf8720901387d9a71542fe.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/648-134-0x00000000031E0000-0x00000000031E7000-memory.dmpFilesize
28KB
-
memory/648-136-0x0000000077B20000-0x0000000077CC3000-memory.dmpFilesize
1.6MB
-
memory/1144-135-0x0000000000000000-mapping.dmp
-
memory/1144-137-0x0000000077B20000-0x0000000077CC3000-memory.dmpFilesize
1.6MB
-
memory/1144-139-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1144-140-0x0000000077B20000-0x0000000077CC3000-memory.dmpFilesize
1.6MB
-
memory/1144-141-0x0000000006DB0000-0x00000000070FA000-memory.dmpFilesize
3.3MB
-
memory/1144-142-0x0000000077B20000-0x0000000077CC3000-memory.dmpFilesize
1.6MB