Analysis
-
max time kernel
95s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 12:05
Static task
static1
Behavioral task
behavioral1
Sample
75cdfaec4d70a869f819702c2a553048.exe
Resource
win7-20221111-en
General
-
Target
75cdfaec4d70a869f819702c2a553048.exe
-
Size
860KB
-
MD5
75cdfaec4d70a869f819702c2a553048
-
SHA1
f720990a2ba4fdce268d923d464489a57cab9978
-
SHA256
ddaf9934762825fb0168b9c861d81cbc664ee2248c912e0ed8bd980289577ee5
-
SHA512
4548cc1e2713f9b87ca0a0b05ca6b4315e2825d4d02f49a3f1a55227899d33a5845adf0438febaddc797a6d5c2297c53002104fc7f2313de1443e035e37cfc68
-
SSDEEP
24576:s35LjrZx3bwurBhQbxa1Q+SDkzR9FskHFt:s3drZx3bwurBhQbxa1lzhHFt
Malware Config
Extracted
formbook
4.1
dv22
ivk-muc.com
theplantgranny.net
efefefficient.buzz
car-deals-87506.com
yangcongzhibo.net
empiralventures.com
latexpillo.com
ferramentafivizzanese.shop
kx1553.com
timamollo.africa
paran6787.net
fabicilio.online
kreativnettchen.shop
manakamana.co.uk
andreapeverelli.shop
jianf.site
kmqan.xyz
aoshilang.com
dnsmctmu.com
pumpkinsmp.net
mixloaded.africa
cunhuatv0.xyz
thedreamrun.co.uk
ldkj9d8.vip
hairtransplant-turkey.com
6635.global
convergeonart.com
ichwillstillen.com
thelivinglovedco.com
whybereasonable.com
fransizrivierasi.com
base2mexico.com
igniteadventureandwellness.com
tradeinclusive.africa
flyingsardine.uno
freziatextile.ru
icimke.com
tubefuckme.net
csvillage.net
dripcentral.shop
idfmusic.com
eyeintheskysecurity.co.uk
ewa-lab.tech
longpostaltubes.co.uk
bee-win.com
disrae.com
haoi111.com
e-curlibrium.com
digiturkrizebayi.com
mrbenmultilinks.africa
gszxtyl.xyz
foresightgroup.africa
metamallmarketplace.com
tobyno.co.uk
asgstafffing.com
kittycatkingdom.shop
amqp.xyz
bayb.boo
landmarkcityguide.com
dististicks.com
tubeporn4k.net
europeaceducation.net
hash2earn.com
jiwuke.com
obgista.africa
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/336-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/336-64-0x000000000041F140-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
75cdfaec4d70a869f819702c2a553048.exedescription pid process target process PID 972 set thread context of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
75cdfaec4d70a869f819702c2a553048.exepid process 336 75cdfaec4d70a869f819702c2a553048.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
75cdfaec4d70a869f819702c2a553048.exedescription pid process target process PID 972 wrote to memory of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe PID 972 wrote to memory of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe PID 972 wrote to memory of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe PID 972 wrote to memory of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe PID 972 wrote to memory of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe PID 972 wrote to memory of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe PID 972 wrote to memory of 336 972 75cdfaec4d70a869f819702c2a553048.exe 75cdfaec4d70a869f819702c2a553048.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75cdfaec4d70a869f819702c2a553048.exe"C:\Users\Admin\AppData\Local\Temp\75cdfaec4d70a869f819702c2a553048.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\75cdfaec4d70a869f819702c2a553048.exe"C:\Users\Admin\AppData\Local\Temp\75cdfaec4d70a869f819702c2a553048.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:336
-