Analysis
-
max time kernel
109s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:19
Static task
static1
Behavioral task
behavioral1
Sample
e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe
Resource
win7-20220901-en
General
-
Target
e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe
-
Size
996KB
-
MD5
328b0fa25e033f6f2551f4466e2010a4
-
SHA1
f418096848ecf5cb9f23ae98d9b521e47e6dad36
-
SHA256
e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f
-
SHA512
3e1b979c6250602a6408c709f8d2dfb9b8588b186e7f31e5907a15c160efc8528bff3d0c7b4b9f8380967a144ca618d83698b38d5e6dee85b060a249989a269b
-
SSDEEP
12288:7Ihm7pdgj6jRPLjRPqjBjjyjBjBjBjBjLjGR9gsapVG/z7hACpzaxBDfQ/NRYvz9:El3IifOCpzqVaNRA2QM5
Malware Config
Extracted
formbook
4.1
gbr
serabet.com
galanggroup.com
zweitmeinung-urologie.com
damsalon.com
binliwine.com
lifeladderindia.com
flyingwranchmanagement.com
tripsandturns.com
3headdesign.com
aluminumfacade.com
toprestau.com
facetreatspa.com
periodrescuekit.com
dbaojian.com
altinotokurtarma.com
gkpelle.com
loguslife.com
treatse.com
lghglzcnkx.net
jawharabh.com
planterboxgardener.com
douyzqdsgl.com
bestofselling.com
carbeloy.com
haok.net
mymailtek.com
itsabossthing.com
peoplesdao.com
bhumarealestate.com
otugxixd.icu
amongugadu.com
jemadrekre.com
nikber.com
genomicsmaster.com
firstbyphone.com
arogyamfarms.com
outletamigo.com
musannafashion.com
dtrixxx.com
quickandeasygroup.com
rawhustleapparel.com
care.land
charmingoneboutique.com
xn--fllessang-g3a.com
trendandjobs.online
voxmediation.com
alkawtherabudhabi.com
peeledeye.com
mcgillfamilylaw.com
prokit.net
my-safebaby.com
bookatalia.com
utilking.com
jhondavid.com
onpassivewithval.com
gtelemed.com
playfighterstube.com
bestfreezerstorage.com
kichnpro.com
sanjeevanicreation.com
allturdsmatter.com
picklebarreldillivers.com
clinversity.com
keystogce.com
bistrolartichaut.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/884-61-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/884-62-0x000000000041EB10-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exedescription pid process target process PID 1768 set thread context of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exepid process 884 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exedescription pid process target process PID 1768 wrote to memory of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe PID 1768 wrote to memory of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe PID 1768 wrote to memory of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe PID 1768 wrote to memory of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe PID 1768 wrote to memory of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe PID 1768 wrote to memory of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe PID 1768 wrote to memory of 884 1768 e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe"C:\Users\Admin\AppData\Local\Temp\e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe"C:\Users\Admin\AppData\Local\Temp\e9aa6a27ec892b6f181ce3b02ad0bdcc89a57ef61095d6328c78a96d1147111f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:884
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1144