Analysis
-
max time kernel
151s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 03:11
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
880KB
-
MD5
b334b3f51ba68fe25f487850ee9710ed
-
SHA1
ea18a63daa9f0b55a96e70bf9e45838f48b56b92
-
SHA256
8ad29501e45ec72a916eccc0b9d34e074dc9f9010c74d32d871d66d4c4351897
-
SHA512
2c653f016428898c75ac85b891ad3b0c98fb80e0b46786773c2af95d0ad18fec13755d9f0ad316186f827ce04454738217789babeb8cd735af1c322fae091450
-
SSDEEP
24576:8RiMfoGdmgFQCIdv/H5e7w7En1gSp4T79j:4QGdlehdH5e7w7EnOSCP
Malware Config
Extracted
formbook
4.1
dv22
ivk-muc.com
theplantgranny.net
efefefficient.buzz
car-deals-87506.com
yangcongzhibo.net
empiralventures.com
latexpillo.com
ferramentafivizzanese.shop
kx1553.com
timamollo.africa
paran6787.net
fabicilio.online
kreativnettchen.shop
manakamana.co.uk
andreapeverelli.shop
jianf.site
kmqan.xyz
aoshilang.com
dnsmctmu.com
pumpkinsmp.net
mixloaded.africa
cunhuatv0.xyz
thedreamrun.co.uk
ldkj9d8.vip
hairtransplant-turkey.com
6635.global
convergeonart.com
ichwillstillen.com
thelivinglovedco.com
whybereasonable.com
fransizrivierasi.com
base2mexico.com
igniteadventureandwellness.com
tradeinclusive.africa
flyingsardine.uno
freziatextile.ru
icimke.com
tubefuckme.net
csvillage.net
dripcentral.shop
idfmusic.com
eyeintheskysecurity.co.uk
ewa-lab.tech
longpostaltubes.co.uk
bee-win.com
disrae.com
haoi111.com
e-curlibrium.com
digiturkrizebayi.com
mrbenmultilinks.africa
gszxtyl.xyz
foresightgroup.africa
metamallmarketplace.com
tobyno.co.uk
asgstafffing.com
kittycatkingdom.shop
amqp.xyz
bayb.boo
landmarkcityguide.com
dististicks.com
tubeporn4k.net
europeaceducation.net
hash2earn.com
jiwuke.com
obgista.africa
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1076-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1076-64-0x000000000041F140-mapping.dmp formbook behavioral1/memory/1076-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1988-75-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1924 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tmp.exetmp.exeexplorer.exedescription pid process target process PID 1520 set thread context of 1076 1520 tmp.exe tmp.exe PID 1076 set thread context of 1272 1076 tmp.exe Explorer.EXE PID 1988 set thread context of 1272 1988 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
tmp.exeexplorer.exepid process 1076 tmp.exe 1076 tmp.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
tmp.exeexplorer.exepid process 1076 tmp.exe 1076 tmp.exe 1076 tmp.exe 1988 explorer.exe 1988 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tmp.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1076 tmp.exe Token: SeDebugPrivilege 1988 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
tmp.exeExplorer.EXEexplorer.exedescription pid process target process PID 1520 wrote to memory of 1076 1520 tmp.exe tmp.exe PID 1520 wrote to memory of 1076 1520 tmp.exe tmp.exe PID 1520 wrote to memory of 1076 1520 tmp.exe tmp.exe PID 1520 wrote to memory of 1076 1520 tmp.exe tmp.exe PID 1520 wrote to memory of 1076 1520 tmp.exe tmp.exe PID 1520 wrote to memory of 1076 1520 tmp.exe tmp.exe PID 1520 wrote to memory of 1076 1520 tmp.exe tmp.exe PID 1272 wrote to memory of 1988 1272 Explorer.EXE explorer.exe PID 1272 wrote to memory of 1988 1272 Explorer.EXE explorer.exe PID 1272 wrote to memory of 1988 1272 Explorer.EXE explorer.exe PID 1272 wrote to memory of 1988 1272 Explorer.EXE explorer.exe PID 1988 wrote to memory of 1924 1988 explorer.exe cmd.exe PID 1988 wrote to memory of 1924 1988 explorer.exe cmd.exe PID 1988 wrote to memory of 1924 1988 explorer.exe cmd.exe PID 1988 wrote to memory of 1924 1988 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Deletes itself
PID:1924
-
-