Analysis
-
max time kernel
84s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe
Resource
win7-20221111-en
General
-
Target
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe
-
Size
955KB
-
MD5
91a972c03758ab433f7e7bbde4158e4d
-
SHA1
b31e8bec1883e2f6d69f0ee8cbfed15454e87c8c
-
SHA256
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa
-
SHA512
ccbbfe77338b609f09e5a76f5881e003d4711f8c0e15a9f21fa1b978518bb7a54453be9fa849f3d7d3318bb980c04e8375120965add9fb734b2cc458c438ffca
-
SSDEEP
12288:1umGKSUdXLIXyKQEy3NbeEOIoWhtfvKtEKu0I:omGKndbIrQEy3NbetsVvnKZI
Malware Config
Extracted
formbook
4.1
gbr
serabet.com
galanggroup.com
zweitmeinung-urologie.com
damsalon.com
binliwine.com
lifeladderindia.com
flyingwranchmanagement.com
tripsandturns.com
3headdesign.com
aluminumfacade.com
toprestau.com
facetreatspa.com
periodrescuekit.com
dbaojian.com
altinotokurtarma.com
gkpelle.com
loguslife.com
treatse.com
lghglzcnkx.net
jawharabh.com
planterboxgardener.com
douyzqdsgl.com
bestofselling.com
carbeloy.com
haok.net
mymailtek.com
itsabossthing.com
peoplesdao.com
bhumarealestate.com
otugxixd.icu
amongugadu.com
jemadrekre.com
nikber.com
genomicsmaster.com
firstbyphone.com
arogyamfarms.com
outletamigo.com
musannafashion.com
dtrixxx.com
quickandeasygroup.com
rawhustleapparel.com
care.land
charmingoneboutique.com
xn--fllessang-g3a.com
trendandjobs.online
voxmediation.com
alkawtherabudhabi.com
peeledeye.com
mcgillfamilylaw.com
prokit.net
my-safebaby.com
bookatalia.com
utilking.com
jhondavid.com
onpassivewithval.com
gtelemed.com
playfighterstube.com
bestfreezerstorage.com
kichnpro.com
sanjeevanicreation.com
allturdsmatter.com
picklebarreldillivers.com
clinversity.com
keystogce.com
bistrolartichaut.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1532-62-0x000000000041EB10-mapping.dmp formbook behavioral1/memory/1532-61-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exedescription pid process target process PID 968 set thread context of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exeb5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exepid process 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe 1532 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exedescription pid process Token: SeDebugPrivilege 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exedescription pid process target process PID 968 wrote to memory of 1492 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1492 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1492 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1492 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1648 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1648 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1648 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1648 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1240 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1240 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1240 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1240 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe PID 968 wrote to memory of 1532 968 b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"2⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"2⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"2⤵PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"C:\Users\Admin\AppData\Local\Temp\b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-