Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe
Resource
win7-20220812-en
General
-
Target
37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe
-
Size
624KB
-
MD5
6da8891fb800ab69248ab7fb447e8636
-
SHA1
e0a985de3aca88960503d02c7d5fa23d4113282a
-
SHA256
37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685
-
SHA512
b5a41ed8aab351980bb2b1424570cd19acbee8fcbfd92ca97cc6019857ba50871f21658f970fee6113d1a0a0dfaef74bba96bacd858d85c100dbae942989ebae
-
SSDEEP
6144:4VZaHGMHjDpfw+FzNMbEj756dGK1YUT33Yz9fAOo/:4VcHGYNfwyp741YGW97o/
Malware Config
Extracted
formbook
3.8
di
baoxiaofan.com
bestwaycartage.com
sag-architecture.com
salamcanteen.com
clinicalpsychologistkerala.com
mttv222.com
theweproject.com
fybbracelets.net
vv666h.com
bangfupin.com
arkprojetos.com
realgoaldigger.com
pilotedphotography.com
6zonxm55.biz
gaoduanmi.com
aminahmad.com
bountymarketing.net
christopher-rennebach.com
02xjys.faith
estilomiau.com
emoneysinhalen.com
av3rytin.com
chinabigtree.com
bless-corporation.com
archispectus.com
thedesignerslab.com
happylax.com
haxballeu.com
tryincubator.com
xmchenhe.com
icantwaittovoteagain.com
xahhr.net
allsaddledup.com
sanjuanislandsoap.net
alkhalid-group.com
fuji-qlick.com
knattertones.info
crackionic.com
zublin-perriere.net
shopesg.com
breastcarehk.com
ttnyfw.com
communistv.com
thfcfirstvariablelimited.com
rickeracheatingplumbing.com
susanamartineznotario.com
fuje.ltd
278manbet.com
elshabory.com
gaxxe.loan
florespreservadas.net
millionethomepage.com
cqkxcg.com
blockchhain.info
atiwhere.com
iot-king.com
pbbzh.win
colachain.com
verifuurbank.com
theplastercompany.com
ad-3.biz
tacootje.com
rushmad.win
galleryjoelle.com
spotekw.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4108-135-0x0000000000000000-mapping.dmp formbook behavioral2/memory/4108-137-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exepid process 4108 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 4108 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exepid process 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exedescription pid process target process PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe PID 1580 wrote to memory of 4108 1580 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe 37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe"C:\Users\Admin\AppData\Local\Temp\37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe"C:\Users\Admin\AppData\Local\Temp\37cc27217109c2599463baf39bb3adbe09382fd89f1403aaddedbf59343da685.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-