Analysis
-
max time kernel
180s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 03:49
Static task
static1
General
-
Target
3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe
-
Size
936KB
-
MD5
45de11e238928df8cf415f31abb63e4a
-
SHA1
a123fee9e91c4b2c5eeefc3493ec22b91961d95e
-
SHA256
3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93
-
SHA512
42b9ab2c2dd4710abfb7f88a01fd3630834004881f5ff28e7cdd44e79ebdd3d77fde66fc1a92b4afed840801c7228472e173b345b07ac46212565d79e6a7fa6c
-
SSDEEP
24576:dr1DtT3FOy+b4lROUhwSz80jcIwqR+LBI:drvLFOS/hc0QIwqRuB
Malware Config
Extracted
formbook
4.1
vr84
intouchenergy.co.uk
lalumalkaliram.com
hillgreenholidays.co.uk
fluentliteracy.com
buildingworkerpower.com
by23577.com
gate-ch375019.online
jayess-decor.com
larkslife.com
swsnacks.co.uk
bigturtletiny.com
egggge.xyz
olastore.africa
lightshowsnewengland.com
daily-lox.com
empireoba.com
91302events.com
lawrencecountyfirechiefs.com
abrahamslibrary.com
cleaner365.online
getmicrostock.net
lightyearsmgmt.com
dentanorma.store
jbproductions.net
acideastern.com
jayess-decor.com
harpy.life
arcadiatownhomesut.com
407loans.com
kxzi803.com
flirtmate.network
mogi.africa
goohodao.xyz
rijnaq.xyz
valourcollection.africa
lateliergc.com
tsunamieng.africa
ctjhpw3.vip
dikevolesav.info
everyclick.africa
595255.biz
aissw.com
digitalpro.africa
giantcourtyard.com
windkind.net
gp5757.com
kino-plasmat.com
led-lighting-90688.com
cyzhan.top
connectionsluxury.com
14782.se
alekseevich1.ru
3wmsr.com
checkssuanalong.com
coveringattorney.com
alshshamil.com
justkillem.com
jmd58.net
e0pvb3.shop
fireballmedia5.com
markallenit.com
dampymatter.com
hrunmall2193.com
faithfultransitions.com
fyndme.net
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4492-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exedescription pid process target process PID 5048 set thread context of 4492 5048 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exepid process 4492 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 4492 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exedescription pid process target process PID 5048 wrote to memory of 4492 5048 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe PID 5048 wrote to memory of 4492 5048 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe PID 5048 wrote to memory of 4492 5048 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe PID 5048 wrote to memory of 4492 5048 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe PID 5048 wrote to memory of 4492 5048 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe PID 5048 wrote to memory of 4492 5048 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe 3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe"C:\Users\Admin\AppData\Local\Temp\3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe"C:\Users\Admin\AppData\Local\Temp\3375a85f28c1c6c7da5ae9684bb5538230e0a186c83dae7377b2a04083de9b93.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-