Analysis
-
max time kernel
148s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 13:12
Static task
static1
Behavioral task
behavioral1
Sample
c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe
Resource
win7-20220812-en
General
-
Target
c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe
-
Size
807KB
-
MD5
458132ead8d6b28dc153956a514a2c27
-
SHA1
434f76cc3ac8fa7f36e1e4c87944eb6036affd3b
-
SHA256
c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda
-
SHA512
3b9d708da96e5ba98bbd7c2b606ef41863928c02c682d604a9f6b76fcad8281ca3e8216a9799d2e6d1c6c514800e1d4f536899c31223a3f205b9cb475ae1fe49
-
SSDEEP
24576:vr18+L74mBfNUstzokjSU4mpfT6Cm3r8JN:vrEU4mpmCmI
Malware Config
Extracted
formbook
4.1
g25e
2491254125.xyz
hookd.gay
uxmelange.com
startupvision3.com
evanwoosley-reed.com
uspalupdser.info
lx0599.com
grupoiaez.com
londonpapershop.com
cremas.store
risespec.com
olivierverdoyant.com
creatednow.com
epicureanhometreats.com
iqijp.com
vcraftboutique.com
furnaristudios.com
dealsgolf.com
djwoojs.com
boatslave.com
godimitators.com
aliatransandlogistics.com
882201.com
canadachildbenefit.online
gfmiami.com
turtlesintenerife.com
hrbyky.com
battlegroundcalifornia.com
52012f.com
oonrmine.xyz
shivkrantitvnews.com
omegabotics.com
wlchsl.com
valuemetamorphosis.com
kghbjx.xyz
10555ff.com
shxmnykj.com
ononoo.net
hanus.tech
9j4.net
drenkol.xyz
ghv0656.com
llynmservice.work
xrwcshheh.tokyo
medbump.online
gongzhibo.com
theplayonline.shop
gmwrk.com
pho-enix.online
zaliangbao.com
izzatwaseem.com
techweek.xyz
sl8249.top
rhogicsom.online
recordtv.net
scbjams.com
swiftmusk.com
closetsbydedign.com
1985555.com
nutrycafe.com
snafoodfoundation.com
philltowingandroadside.com
bidolupartner.xyz
gjwluxa.com
esmemariang.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1796-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1796-64-0x000000000041F090-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exedescription pid process target process PID 2044 set thread context of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exepid process 1796 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exedescription pid process target process PID 2044 wrote to memory of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe PID 2044 wrote to memory of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe PID 2044 wrote to memory of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe PID 2044 wrote to memory of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe PID 2044 wrote to memory of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe PID 2044 wrote to memory of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe PID 2044 wrote to memory of 1796 2044 c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe"C:\Users\Admin\AppData\Local\Temp\c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe"C:\Users\Admin\AppData\Local\Temp\c8702255a89a489a0e9dbad263a8f491038191c78a20f6cf57429af09b2c2dda.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-