Analysis
-
max time kernel
229s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe
Resource
win7-20221111-en
General
-
Target
4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe
-
Size
472KB
-
MD5
e7cc07a1704145c6843330345fd1ce0b
-
SHA1
6da282da7b2151eeb7da06b0ce8e1beb64e585a1
-
SHA256
4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7
-
SHA512
45ed8bf0670a38dc090f766120e1e1612826a24434c39b6afacb04ed023fafd2561a53e2680917cb5fdcea8919bcc5c20af0e53eebaa181d186dc6b4eba01b6e
-
SSDEEP
12288:Yz2RENHa7bDjN3MyC2AzkfCpzGmZSgW+b3:Yzuw2N2pzGmq+b
Malware Config
Extracted
formbook
3.0
by
mozkuia.com
oyxezj.men
valuecodeconsultants.com
ivyleaguetraining.com
darqvam.run
izmirkadinsagligi.com
cvn8866.com
yourbigandgood4updates.review
cajienvios.com
promypages.info
trendsreverso.com
veganspoonfuls.info
p2ptexting.com
hdwmy.com
wmrobots.net
danstamos.com
rewardcarousel.com
esports-mindset.com
kccustodylawyer.com
longdingsz.com
gslzxq.com
superyachtonline.com
zigzagefflorescence.com
vdezk.com
kraus-info.com
offroadsuite.com
apotecarialafora.com
mvwacth.online
zdrowezycie.net
ogvalves.com
thebrexit.site
whydidifail.com
bleulimousin.com
chosendoorproperty.com
gdpwmf.men
xn--fhq01j.com
jiaxing.ink
louisvilletennis.net
samedayhousebuyer.com
vjawkx.men
castlepinesgolfclubcatering.net
scrossroinmountgub.win
localizarmeuiphone.com
travelbooking.win
quannengshen.com
alluringshoes.com
puyku.net
beautosystems.com
dunwoodyhomesforsale.info
8744yellowspringsroad.com
madybymischa.com
hinter-klein-winter.net
kiddosophy.com
roosters-club.com
bjyprinting.com
floriandlask.com
rendako.info
chenyonghua8.com
louisvv.com
admee.win
sparks.place
mysuperlong.com
shtieyuan.com
therealyungced.com
alchildez.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/692-56-0x0000000010000000-0x000000001007A000-memory.dmp formbook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1476 692 WerFault.exe 4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exepid process 692 4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exedescription pid process target process PID 692 wrote to memory of 1476 692 4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe WerFault.exe PID 692 wrote to memory of 1476 692 4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe WerFault.exe PID 692 wrote to memory of 1476 692 4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe WerFault.exe PID 692 wrote to memory of 1476 692 4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe"C:\Users\Admin\AppData\Local\Temp\4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 1522⤵
- Program crash
PID:1476
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/692-54-0x0000000074E61000-0x0000000074E63000-memory.dmpFilesize
8KB
-
memory/692-56-0x0000000010000000-0x000000001007A000-memory.dmpFilesize
488KB
-
memory/692-57-0x0000000001F80000-0x0000000002283000-memory.dmpFilesize
3.0MB
-
memory/1476-55-0x0000000000000000-mapping.dmp