Analysis
-
max time kernel
88s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 18:15
Static task
static1
Behavioral task
behavioral1
Sample
9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe
Resource
win7-20221111-en
General
-
Target
9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe
-
Size
456KB
-
MD5
60be7286ec1b99627d280ecc8836d8bf
-
SHA1
54275d9e0644a64409c7ebf428fb896b8fc09cc1
-
SHA256
9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60
-
SHA512
4e8639fd733c2a95f0c924f30737aaf7751e1464c9cd04624175daadaa4609cfbccfcde9ab566a679434498374fff413c21c3c461f989262d749af3b3887bd2e
-
SSDEEP
12288:oRg+au+xD+twE66E9b+2Bpme3r8ptnDBMdK+5rT:R39yipnmeb2DmdbT
Malware Config
Extracted
formbook
3.8
el
fundayinc.com
91shiping.red
piccgz.com
greylockiceandheating.com
6-15hothamstreetstkildaeast.com
bladspiegel.com
xn--ruq41buok09a6r0azmh.com
reallifeandlipstick.com
wwwjinsha594.com
wpnull.info
dtaubman.net
eldhw.win
caringhouseholds.com
texasisrael.com
confiservice.com
unihome.store
xn--doqs90b84tkjg.com
xuanweiping.com
edictiosapiens.com
kalkulatorkredytow.online
christopherkawell.com
onve2.info
manwipes.company
abtotomotivvenakliyat.com
irma-indemnisation.com
nicewayx.com
hrsstaging.com
caucasiancatchphrase.com
shufsd.net
hxa.design
www8458r.com
retocon.com
naturesoonsoo.com
ineffablelife.com
51btcaifu.com
xn--i20bz3evvky1i0xe.com
sihaimsc.com
digitetc.com
julian-salz.com
latinopensource.net
1998baby.com
lemqgqzine.online
yourschoolpic.com
newsale.top
bowenhuanqiu.com
assysro.com
textradeuk.com
baiku777.com
mail-oppai-sex.info
hnyh-zzsy.com
kcp-laos.com
dushi.ink
az0cbjj9rj.biz
kjontn.info
7ianle.info
feesto.com
raterank.review
simplyhomemadedesserts.com
kayciezhang.com
rliliedahl.com
hypnoses-bordeaux.com
xuanwu176.com
hutnw.loan
decentralizedsystems.net
weltho.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3548-139-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2404 set thread context of 3548 2404 9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 4448 3548 WerFault.exe 87 1432 3548 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3548 9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe 3548 9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3548 2404 9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe 87 PID 2404 wrote to memory of 3548 2404 9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe 87 PID 2404 wrote to memory of 3548 2404 9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe"C:\Users\Admin\AppData\Local\Temp\9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exeC:\Users\Admin\AppData\Local\Temp\9108b35ff3990b95827cb5c530c3b9e960ea215fb4488b33ad24af92e80c6b60.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 4243⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 4323⤵
- Program crash
PID:1432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3548 -ip 35481⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3548 -ip 35481⤵PID:1232