Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
7f53b20635e357caab65fc28f8a3667a.exe
Resource
win7-20221111-en
General
-
Target
7f53b20635e357caab65fc28f8a3667a.exe
-
Size
948KB
-
MD5
7f53b20635e357caab65fc28f8a3667a
-
SHA1
62f910bf47b40a1c9bc578e71ce57aaa3dccd06c
-
SHA256
7e1f215877d458883e98c874ce1226b561f0ddd5114dad6baef44d66d33a98a6
-
SHA512
0f55a2fcb97c856bf11f66c3b5bdb77e213e296987886507f4b18e4bc4c53f175b217a2318231a5db60891c43392578610e8d7cea570e0083b07e3053fbb5ff7
-
SSDEEP
12288:Y2SxFBoGPtdUAyeiHuc+6eiK+6Os0a980pY+ZmBjHUk+qxK3o3:JSzBXl9PiHuFpiK+6Os0U8shZmBHO
Malware Config
Extracted
formbook
4.1
vr84
intouchenergy.co.uk
lalumalkaliram.com
hillgreenholidays.co.uk
fluentliteracy.com
buildingworkerpower.com
by23577.com
gate-ch375019.online
jayess-decor.com
larkslife.com
swsnacks.co.uk
bigturtletiny.com
egggge.xyz
olastore.africa
lightshowsnewengland.com
daily-lox.com
empireoba.com
91302events.com
lawrencecountyfirechiefs.com
abrahamslibrary.com
cleaner365.online
getmicrostock.net
lightyearsmgmt.com
dentanorma.store
jbproductions.net
acideastern.com
jayess-decor.com
harpy.life
arcadiatownhomesut.com
407loans.com
kxzi803.com
flirtmate.network
mogi.africa
goohodao.xyz
rijnaq.xyz
valourcollection.africa
lateliergc.com
tsunamieng.africa
ctjhpw3.vip
dikevolesav.info
everyclick.africa
595255.biz
aissw.com
digitalpro.africa
giantcourtyard.com
windkind.net
gp5757.com
kino-plasmat.com
led-lighting-90688.com
cyzhan.top
connectionsluxury.com
14782.se
alekseevich1.ru
3wmsr.com
checkssuanalong.com
coveringattorney.com
alshshamil.com
justkillem.com
jmd58.net
e0pvb3.shop
fireballmedia5.com
markallenit.com
dampymatter.com
hrunmall2193.com
faithfultransitions.com
fyndme.net
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4328-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7f53b20635e357caab65fc28f8a3667a.exedescription pid process target process PID 3836 set thread context of 4328 3836 7f53b20635e357caab65fc28f8a3667a.exe 7f53b20635e357caab65fc28f8a3667a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7f53b20635e357caab65fc28f8a3667a.exepid process 4328 7f53b20635e357caab65fc28f8a3667a.exe 4328 7f53b20635e357caab65fc28f8a3667a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7f53b20635e357caab65fc28f8a3667a.exedescription pid process target process PID 3836 wrote to memory of 4328 3836 7f53b20635e357caab65fc28f8a3667a.exe 7f53b20635e357caab65fc28f8a3667a.exe PID 3836 wrote to memory of 4328 3836 7f53b20635e357caab65fc28f8a3667a.exe 7f53b20635e357caab65fc28f8a3667a.exe PID 3836 wrote to memory of 4328 3836 7f53b20635e357caab65fc28f8a3667a.exe 7f53b20635e357caab65fc28f8a3667a.exe PID 3836 wrote to memory of 4328 3836 7f53b20635e357caab65fc28f8a3667a.exe 7f53b20635e357caab65fc28f8a3667a.exe PID 3836 wrote to memory of 4328 3836 7f53b20635e357caab65fc28f8a3667a.exe 7f53b20635e357caab65fc28f8a3667a.exe PID 3836 wrote to memory of 4328 3836 7f53b20635e357caab65fc28f8a3667a.exe 7f53b20635e357caab65fc28f8a3667a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f53b20635e357caab65fc28f8a3667a.exe"C:\Users\Admin\AppData\Local\Temp\7f53b20635e357caab65fc28f8a3667a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\7f53b20635e357caab65fc28f8a3667a.exe"C:\Users\Admin\AppData\Local\Temp\7f53b20635e357caab65fc28f8a3667a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-