Analysis
-
max time kernel
18s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:11
Static task
static1
Behavioral task
behavioral1
Sample
b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe
Resource
win7-20221111-en
General
-
Target
b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe
-
Size
624KB
-
MD5
1852f73f39ab8c254e5a32b6dc87a4c1
-
SHA1
86f2cd8e3db60ce3e29b89501d2d79f802b1e35a
-
SHA256
b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89
-
SHA512
7f6114e9178010de101af204fd106a306a60d82a442b5e274e86279d196683fe53ffa00cb368bdcf873ebf4769f4db8b934f4767d9a60ebce1dd8d2699b2a866
-
SSDEEP
6144:DYdS4Ty2u4np1m91T7eqEP5vzL2WBCB9hJo1RAKks6:DB46wqFE0YCBRo1RABs
Malware Config
Extracted
formbook
3.8
di
baoxiaofan.com
bestwaycartage.com
sag-architecture.com
salamcanteen.com
clinicalpsychologistkerala.com
mttv222.com
theweproject.com
fybbracelets.net
vv666h.com
bangfupin.com
arkprojetos.com
realgoaldigger.com
pilotedphotography.com
6zonxm55.biz
gaoduanmi.com
aminahmad.com
bountymarketing.net
christopher-rennebach.com
02xjys.faith
estilomiau.com
emoneysinhalen.com
av3rytin.com
chinabigtree.com
bless-corporation.com
archispectus.com
thedesignerslab.com
happylax.com
haxballeu.com
tryincubator.com
xmchenhe.com
icantwaittovoteagain.com
xahhr.net
allsaddledup.com
sanjuanislandsoap.net
alkhalid-group.com
fuji-qlick.com
knattertones.info
crackionic.com
zublin-perriere.net
shopesg.com
breastcarehk.com
ttnyfw.com
communistv.com
thfcfirstvariablelimited.com
rickeracheatingplumbing.com
susanamartineznotario.com
fuje.ltd
278manbet.com
elshabory.com
gaxxe.loan
florespreservadas.net
millionethomepage.com
cqkxcg.com
blockchhain.info
atiwhere.com
iot-king.com
pbbzh.win
colachain.com
verifuurbank.com
theplastercompany.com
ad-3.biz
tacootje.com
rushmad.win
galleryjoelle.com
spotekw.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/700-58-0x0000000000000000-mapping.dmp formbook behavioral1/memory/700-60-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exepid process 700 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exepid process 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exedescription pid process target process PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe PID 2036 wrote to memory of 700 2036 b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe"C:\Users\Admin\AppData\Local\Temp\b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe"C:\Users\Admin\AppData\Local\Temp\b0adb7c3e887e6bcbe21abcf54851718f7eceeef31f570a76fb648ecb204cc89.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:700
-