Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-02-2023 09:23
Static task
static1
Behavioral task
behavioral1
Sample
swift copy of payment MT301.exe
Resource
win7-20221111-en
General
-
Target
swift copy of payment MT301.exe
-
Size
722KB
-
MD5
6c8861d0c5093645595b3ff9187b6ebe
-
SHA1
1ee8d66607c82691ef0efc5a1a7d860fc02a23c2
-
SHA256
802ef9033535b7c8c8b6844eb030ab8fa10f6427d45d5b7f8339f5d89cff1958
-
SHA512
949694fd0c528b918e85e2a525a23b64006d4387758eae2e3fab1661bcd15883fce5dea06a05cc74902dd093a6a97f7973b87cac53001707cb8a04b955d79d63
-
SSDEEP
12288:fxKkMtEwcU3gZ+GQzjkATGdsWMQi4DvvH01VNelXWMUJIiwuYSlSrGo/1Sur:ph6AAgZbQzlGvi4DvvUD+XW6MSVAg
Malware Config
Extracted
formbook
4.1
gg62
growfast.africa
lerema.com
38945.se
wheelfermotors.africa
giftshareforyou.online
burrismktg.com
keepgrowing.uk
efefhomeless.buzz
bryanokoh.com
fashion-clothing-40094.com
andreasunshine.com
naijahood.africa
aditrirealty.com
kinnoitodatsumou.com
cryptoqzclimax.com
hairly.biz
comeuphither4.com
integrity360.ltd
flushywhole.com
8869365.com
fabvance-demos.online
motherpearl.africa
dnsmctmu.com
25779.football
crimson-sunset.ru
haamyounghoon.com
0563news.com
battleb0t.site
transnetfreight.africa
djdaxroadshow.co.uk
bwrps.live
abuin.vip
impressionsbyb.store
findguyscolorado.com
jordanflowerauction.net
fdm50off.com
31seaaa.com
centuryofviolence.co.uk
againstszhanweek.com
injurylawyersconsultants.com
kuotabike.com
cruisejoy.uk
clotaire.ru
hurloic.xyz
anvair.com
ivapeonthis.com
hotsesso.xyz
khramvyazovki.store
mentalistas.dev
cahayasunnah.com
bypro1.online
flavoredkreations.info
inuwallet.com
livingemployebenefits.com
enlighthings.com
focobreathwork.com
emaskhalipahbertam.com
jswl.store
chamaera.com
abbeyspear.com
downwind.one
lovelive.buzz
essentialhealth101.com
irakit.com
cbsht.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1852-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1852-64-0x000000000041F0B0-mapping.dmp formbook behavioral1/memory/1852-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/564-73-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook behavioral1/memory/564-78-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 940 set thread context of 1852 940 swift copy of payment MT301.exe 28 PID 1852 set thread context of 1376 1852 swift copy of payment MT301.exe 16 PID 564 set thread context of 1376 564 msiexec.exe 16 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1852 swift copy of payment MT301.exe 1852 swift copy of payment MT301.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe 564 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1852 swift copy of payment MT301.exe 1852 swift copy of payment MT301.exe 1852 swift copy of payment MT301.exe 564 msiexec.exe 564 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1852 swift copy of payment MT301.exe Token: SeDebugPrivilege 564 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1376 Explorer.EXE 1376 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1376 Explorer.EXE 1376 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 940 wrote to memory of 1852 940 swift copy of payment MT301.exe 28 PID 940 wrote to memory of 1852 940 swift copy of payment MT301.exe 28 PID 940 wrote to memory of 1852 940 swift copy of payment MT301.exe 28 PID 940 wrote to memory of 1852 940 swift copy of payment MT301.exe 28 PID 940 wrote to memory of 1852 940 swift copy of payment MT301.exe 28 PID 940 wrote to memory of 1852 940 swift copy of payment MT301.exe 28 PID 940 wrote to memory of 1852 940 swift copy of payment MT301.exe 28 PID 1376 wrote to memory of 564 1376 Explorer.EXE 29 PID 1376 wrote to memory of 564 1376 Explorer.EXE 29 PID 1376 wrote to memory of 564 1376 Explorer.EXE 29 PID 1376 wrote to memory of 564 1376 Explorer.EXE 29 PID 1376 wrote to memory of 564 1376 Explorer.EXE 29 PID 1376 wrote to memory of 564 1376 Explorer.EXE 29 PID 1376 wrote to memory of 564 1376 Explorer.EXE 29 PID 564 wrote to memory of 1916 564 msiexec.exe 30 PID 564 wrote to memory of 1916 564 msiexec.exe 30 PID 564 wrote to memory of 1916 564 msiexec.exe 30 PID 564 wrote to memory of 1916 564 msiexec.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\swift copy of payment MT301.exe"C:\Users\Admin\AppData\Local\Temp\swift copy of payment MT301.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\swift copy of payment MT301.exe"C:\Users\Admin\AppData\Local\Temp\swift copy of payment MT301.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\swift copy of payment MT301.exe"3⤵
- Deletes itself
PID:1916
-
-