Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 14:55
Static task
static1
Behavioral task
behavioral1
Sample
6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe
Resource
win7-20220812-en
General
-
Target
6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe
-
Size
340KB
-
MD5
b6a71f32c73d5392dc3dcf5ebfd9f11a
-
SHA1
82af158a9984597cfb71570ff87f52421e1b0d2c
-
SHA256
6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1
-
SHA512
aa6b1bc9ff70689c0740683c0858a48b348c4d9f018c3ca11745dcb74480efb89b89dc002159576cd0c461ff9b2de320729a3a40f984a83a8698a4e99d4f959b
-
SSDEEP
6144:D3yaVwC1pYMTJCTmjd3M3YqUoqNgtDK5BGN1BOpF1d8EWkFRTlV1erRSaYv0P3:bVwMmgJEmjd4/UoqNggDGNaFGEWO1edH
Malware Config
Extracted
formbook
4.1
c239
shareourjesus.com
lavictoriaesdetodos.com
helpfulproductions.com
waggonerplastics.com
skipouya.com
everyoneshoroscope.com
winterstokeview.com
gutsyhomemakers.com
redstatesdigital.com
themacmeliusshow.com
beautybarnantucket.com
wearetwo-a.com
thenutritionessentialist.com
tapsiwadhwa.com
jundicompany.net
gobocawest.com
woodking.space
elegantap.com
2ndoss.info
ebay1111.com
libloc.info
rembiu.com
myenterprisesdesk.com
advancedcaremedical.com
paintingservicespune.com
sz128129.com
projkles.com
hermonexgold.com
xn--1000-3ua.com
greatplainscoffeecraze.com
educoinxchange.com
elclubswinger.com
lacrimis.com
extendedsecurityservices.com
district9asda.com
weidianmc.com
richgladiator.com
babehou.com
fastoffer.house
ttxxremote.icu
naigves.com
kamalaharriswillneverbevp.com
programmerjobsnow.info
hezlee.com
zfstyz.com
weblovetn.xyz
comadison.com
bestpadelcourt.com
coviders19.com
takeandpressplay.com
mangajohosta.com
angelaahbzanderson.com
stanleywatches.com
studiobyshirls.com
cloudengineer360.com
heavenlybluepool.com
evargasdev.com
140b.xyz
michaelvancebromfield.com
emotionalgun.club
mocingbird.solutions
ace1inc.com
camwoobats.com
leadconverters.info
qatib.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1532-133-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1260-135-0x00000000001C0000-0x00000000001EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exedescription pid process target process PID 1260 set thread context of 1532 1260 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exepid process 1532 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 1532 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exedescription pid process target process PID 1260 wrote to memory of 1532 1260 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe PID 1260 wrote to memory of 1532 1260 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe PID 1260 wrote to memory of 1532 1260 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe PID 1260 wrote to memory of 1532 1260 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe PID 1260 wrote to memory of 1532 1260 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe PID 1260 wrote to memory of 1532 1260 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe 6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe"C:\Users\Admin\AppData\Local\Temp\6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe"C:\Users\Admin\AppData\Local\Temp\6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-