Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 17:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
880KB
-
MD5
b334b3f51ba68fe25f487850ee9710ed
-
SHA1
ea18a63daa9f0b55a96e70bf9e45838f48b56b92
-
SHA256
8ad29501e45ec72a916eccc0b9d34e074dc9f9010c74d32d871d66d4c4351897
-
SHA512
2c653f016428898c75ac85b891ad3b0c98fb80e0b46786773c2af95d0ad18fec13755d9f0ad316186f827ce04454738217789babeb8cd735af1c322fae091450
-
SSDEEP
24576:8RiMfoGdmgFQCIdv/H5e7w7En1gSp4T79j:4QGdlehdH5e7w7EnOSCP
Malware Config
Extracted
formbook
4.1
dv22
ivk-muc.com
theplantgranny.net
efefefficient.buzz
car-deals-87506.com
yangcongzhibo.net
empiralventures.com
latexpillo.com
ferramentafivizzanese.shop
kx1553.com
timamollo.africa
paran6787.net
fabicilio.online
kreativnettchen.shop
manakamana.co.uk
andreapeverelli.shop
jianf.site
kmqan.xyz
aoshilang.com
dnsmctmu.com
pumpkinsmp.net
mixloaded.africa
cunhuatv0.xyz
thedreamrun.co.uk
ldkj9d8.vip
hairtransplant-turkey.com
6635.global
convergeonart.com
ichwillstillen.com
thelivinglovedco.com
whybereasonable.com
fransizrivierasi.com
base2mexico.com
igniteadventureandwellness.com
tradeinclusive.africa
flyingsardine.uno
freziatextile.ru
icimke.com
tubefuckme.net
csvillage.net
dripcentral.shop
idfmusic.com
eyeintheskysecurity.co.uk
ewa-lab.tech
longpostaltubes.co.uk
bee-win.com
disrae.com
haoi111.com
e-curlibrium.com
digiturkrizebayi.com
mrbenmultilinks.africa
gszxtyl.xyz
foresightgroup.africa
metamallmarketplace.com
tobyno.co.uk
asgstafffing.com
kittycatkingdom.shop
amqp.xyz
bayb.boo
landmarkcityguide.com
dististicks.com
tubeporn4k.net
europeaceducation.net
hash2earn.com
jiwuke.com
obgista.africa
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1744-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1744-64-0x000000000041F140-mapping.dmp formbook behavioral1/memory/1744-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/668-74-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/668-78-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1932 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
file.exefile.exeraserver.exedescription pid process target process PID 1460 set thread context of 1744 1460 file.exe file.exe PID 1744 set thread context of 1208 1744 file.exe Explorer.EXE PID 668 set thread context of 1208 668 raserver.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
file.exeraserver.exepid process 1744 file.exe 1744 file.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
file.exeraserver.exepid process 1744 file.exe 1744 file.exe 1744 file.exe 668 raserver.exe 668 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
file.exeraserver.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1744 file.exe Token: SeDebugPrivilege 668 raserver.exe Token: SeShutdownPrivilege 1208 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
file.exeExplorer.EXEraserver.exedescription pid process target process PID 1460 wrote to memory of 1744 1460 file.exe file.exe PID 1460 wrote to memory of 1744 1460 file.exe file.exe PID 1460 wrote to memory of 1744 1460 file.exe file.exe PID 1460 wrote to memory of 1744 1460 file.exe file.exe PID 1460 wrote to memory of 1744 1460 file.exe file.exe PID 1460 wrote to memory of 1744 1460 file.exe file.exe PID 1460 wrote to memory of 1744 1460 file.exe file.exe PID 1208 wrote to memory of 668 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 668 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 668 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 668 1208 Explorer.EXE raserver.exe PID 668 wrote to memory of 1932 668 raserver.exe cmd.exe PID 668 wrote to memory of 1932 668 raserver.exe cmd.exe PID 668 wrote to memory of 1932 668 raserver.exe cmd.exe PID 668 wrote to memory of 1932 668 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Deletes itself
PID:1932
-
-