Analysis
-
max time kernel
39s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 17:29
Static task
static1
Behavioral task
behavioral1
Sample
f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe
Resource
win7-20221111-en
General
-
Target
f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe
-
Size
501KB
-
MD5
3b92452984ee117a07b0a79d2932f3cb
-
SHA1
4996654a39d238bb91bb464edfa3d301c516ce69
-
SHA256
f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1
-
SHA512
f8b9944cc675b6d6a331994d6c17bd434670d1438bb9bd449307413e941f0aeb82e18717d40fe68852a0e8923c09186065d2a93d73695ced82930bc036648d06
-
SSDEEP
12288:J2xbIeZ3fmiS4s5Xkg3Fo9Aqbkd2/z+rA:wbIeZ3unzXkYo9Aqb2s
Malware Config
Extracted
formbook
3.9
ko
batatproject.com
mydaxuetang.com
clmproject.com
die-erste-werkstatt.com
constructiveproductions.com
vorhersage.net
jonathanandcolleen.com
crmparis.com
thesexpistolsvevo.com
sauna.media
osmspayments.net
320903.com
keshuotech.com
smpql.com
ssgan75.com
651bifa.com
weyena.com
lauraradu.com
carbuco.com
thejobdocs.com
petlas.video
histoiresdeliberation.com
anniesmirrorfadviser.com
rytgpg.info
mijiuji.com
aenmiao.com
mitrovica-top.com
1960pe.com
11-kcd.com
luggageonline.review
beritaakhirzaman.com
formulabuckeyes.net
app16888.com
ggtyjx.com
shapeuapp.com
vdog.ltd
geniuswhisperer.com
mobilenot.com
sdmdbj.com
onesteez.com
placementinfos.com
hdcooper.com
ccubk6.com
djiboutitravels.com
brand028.com
rennaicloud.com
monumentalsounds.com
harveyfloodhelp.info
consulvatis.com
pinkbabynail.com
nanyouxi.info
jamesbrennan.info
onehealingpath.com
skagitpcrepair.com
khusharshil.com
applyonline.life
hayamsokar.com
uiy.info
gasparriandjoycesc.com
shmazhoufund.com
bestbime.com
pouchjiutser.net
1m4tenkey.loan
y1zc.com
bonzaj.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1344-65-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/1344-64-0x0000000000400000-0x000000000047D000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 956 set thread context of 1344 956 f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1344 f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 956 f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 1344 956 f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe 28 PID 956 wrote to memory of 1344 956 f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe 28 PID 956 wrote to memory of 1344 956 f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe 28 PID 956 wrote to memory of 1344 956 f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe"C:\Users\Admin\AppData\Local\Temp\f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exeC:\Users\Admin\AppData\Local\Temp\f0523a3740dcc2d5e2aba1ed1ffa39466017fef13375e0167d71382037175be1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-