Analysis
-
max time kernel
189s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 17:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
880KB
-
MD5
b334b3f51ba68fe25f487850ee9710ed
-
SHA1
ea18a63daa9f0b55a96e70bf9e45838f48b56b92
-
SHA256
8ad29501e45ec72a916eccc0b9d34e074dc9f9010c74d32d871d66d4c4351897
-
SHA512
2c653f016428898c75ac85b891ad3b0c98fb80e0b46786773c2af95d0ad18fec13755d9f0ad316186f827ce04454738217789babeb8cd735af1c322fae091450
-
SSDEEP
24576:8RiMfoGdmgFQCIdv/H5e7w7En1gSp4T79j:4QGdlehdH5e7w7EnOSCP
Malware Config
Extracted
formbook
4.1
dv22
ivk-muc.com
theplantgranny.net
efefefficient.buzz
car-deals-87506.com
yangcongzhibo.net
empiralventures.com
latexpillo.com
ferramentafivizzanese.shop
kx1553.com
timamollo.africa
paran6787.net
fabicilio.online
kreativnettchen.shop
manakamana.co.uk
andreapeverelli.shop
jianf.site
kmqan.xyz
aoshilang.com
dnsmctmu.com
pumpkinsmp.net
mixloaded.africa
cunhuatv0.xyz
thedreamrun.co.uk
ldkj9d8.vip
hairtransplant-turkey.com
6635.global
convergeonart.com
ichwillstillen.com
thelivinglovedco.com
whybereasonable.com
fransizrivierasi.com
base2mexico.com
igniteadventureandwellness.com
tradeinclusive.africa
flyingsardine.uno
freziatextile.ru
icimke.com
tubefuckme.net
csvillage.net
dripcentral.shop
idfmusic.com
eyeintheskysecurity.co.uk
ewa-lab.tech
longpostaltubes.co.uk
bee-win.com
disrae.com
haoi111.com
e-curlibrium.com
digiturkrizebayi.com
mrbenmultilinks.africa
gszxtyl.xyz
foresightgroup.africa
metamallmarketplace.com
tobyno.co.uk
asgstafffing.com
kittycatkingdom.shop
amqp.xyz
bayb.boo
landmarkcityguide.com
dististicks.com
tubeporn4k.net
europeaceducation.net
hash2earn.com
jiwuke.com
obgista.africa
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2152-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2152-143-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2152-146-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1776-150-0x00000000008E0000-0x000000000090F000-memory.dmp formbook behavioral2/memory/1776-155-0x00000000008E0000-0x000000000090F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
file.exefile.exewlanext.exedescription pid process target process PID 4124 set thread context of 2152 4124 file.exe file.exe PID 2152 set thread context of 964 2152 file.exe Explorer.EXE PID 2152 set thread context of 964 2152 file.exe Explorer.EXE PID 1776 set thread context of 964 1776 wlanext.exe Explorer.EXE -
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
file.exewlanext.exepid process 2152 file.exe 2152 file.exe 2152 file.exe 2152 file.exe 2152 file.exe 2152 file.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe 1776 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 964 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
file.exewlanext.exepid process 2152 file.exe 2152 file.exe 2152 file.exe 2152 file.exe 1776 wlanext.exe 1776 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
file.exewlanext.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2152 file.exe Token: SeDebugPrivilege 1776 wlanext.exe Token: SeShutdownPrivilege 964 Explorer.EXE Token: SeCreatePagefilePrivilege 964 Explorer.EXE Token: SeShutdownPrivilege 964 Explorer.EXE Token: SeCreatePagefilePrivilege 964 Explorer.EXE Token: SeShutdownPrivilege 964 Explorer.EXE Token: SeCreatePagefilePrivilege 964 Explorer.EXE Token: SeShutdownPrivilege 964 Explorer.EXE Token: SeCreatePagefilePrivilege 964 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exefile.exewlanext.exedescription pid process target process PID 4124 wrote to memory of 2152 4124 file.exe file.exe PID 4124 wrote to memory of 2152 4124 file.exe file.exe PID 4124 wrote to memory of 2152 4124 file.exe file.exe PID 4124 wrote to memory of 2152 4124 file.exe file.exe PID 4124 wrote to memory of 2152 4124 file.exe file.exe PID 4124 wrote to memory of 2152 4124 file.exe file.exe PID 2152 wrote to memory of 1776 2152 file.exe wlanext.exe PID 2152 wrote to memory of 1776 2152 file.exe wlanext.exe PID 2152 wrote to memory of 1776 2152 file.exe wlanext.exe PID 1776 wrote to memory of 3580 1776 wlanext.exe cmd.exe PID 1776 wrote to memory of 3580 1776 wlanext.exe cmd.exe PID 1776 wrote to memory of 3580 1776 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:964 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\file.exe"5⤵PID:3580
-
-
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4816
-