Analysis
-
max time kernel
196s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 13:03
Static task
static1
Behavioral task
behavioral1
Sample
651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe
Resource
win7-20220901-en
General
-
Target
651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe
-
Size
697KB
-
MD5
5e14c731e0b4f67493b838262b7364cb
-
SHA1
47437d61e5e025ae8e6f7d4a6172edeead8e29c1
-
SHA256
651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0
-
SHA512
65a8ee82d4f4ec9a9f3574ab5a603ffd08ee028865fa67b09c62e36b4c83f500ae1c376b43a55265760879a8b057f7f47e75651c8076523f85e315af1de078ee
-
SSDEEP
12288:+4Vgh/PsZ1DX/VDJI6J8TOmb0PIL1gHH4WfgLO5zsJr:BVgh/PU8/QPhHY5O5QJr
Malware Config
Extracted
formbook
4.1
g28p
whhmgs.asia
wellmedcaredirect.net
beggarded.com
wtpjiv.site
todo-celulares.com
parkitny.net
43345.top
pro-genie.com
cwdxz.com
cbc-inc.xyz
healthspots.net
rulil.top
pyramidaudit.solutions
k8sb15.live
hempaware.report
usclink.life
stayefs.net
05262.top
shop-izakaya-jin.com
iccworldcupnews.com
lulamail.xyz
dubaistocks.club
royaleyeandearhospital.com
cash-date.biz
hbfcjgj.com
zcx625.fun
compra-venta-autos.online
waltherchen.xyz
asyimpo.xyz
gayxxxporn.info
xn--igvy44d.xn--55qx5d
teaktime.net
aydesign.xyz
hfamq.site
tunayreklam.net
rxof.rest
naturebody.love
elijahelijah.com
lojasiadis.com
amazrsxrszwna.com
realtranzex.com
elelfo3d.fun
fse.community
28369.xyz
minigolfauthority.net
venturebestdeals.click
robeholidayrentals.store
edarva.skin
xikixvtj.work
ecolabspeyua.store
infidelitytoolkit.com
crawfordbayoysterroast.net
adenongel.dentist
appliancegrey.site
ky7769.com
kshd.xyz
ausbonusbets.com
aks.capital
rv8288.xyz
retetelebunicii.com
younginheart.net
ps4controller.net
todotutoriales10.com
boletosdeavionbaratos.com
spartanburgwebdesign.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4488-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exedescription pid process target process PID 3844 set thread context of 4488 3844 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exepid process 4488 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 4488 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exedescription pid process target process PID 3844 wrote to memory of 4488 3844 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe PID 3844 wrote to memory of 4488 3844 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe PID 3844 wrote to memory of 4488 3844 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe PID 3844 wrote to memory of 4488 3844 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe PID 3844 wrote to memory of 4488 3844 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe PID 3844 wrote to memory of 4488 3844 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe 651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe"C:\Users\Admin\AppData\Local\Temp\651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe"C:\Users\Admin\AppData\Local\Temp\651404e566b5d65563d62eeca4c89c4b1ae3ed40fb440819b233f576c91d1cc0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-