Analysis
-
max time kernel
45s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-02-2023 11:33
Static task
static1
Behavioral task
behavioral1
Sample
1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe
Resource
win7-20220812-en
General
-
Target
1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe
-
Size
665KB
-
MD5
1671739b7061eae33d9603cf5e213207
-
SHA1
00eda59ab9ff4c9358a5b0dc0abdac7b4a2b1c95
-
SHA256
1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f
-
SHA512
ee15df28f2279b6ced82afb9c69eafcf372858148d1eee3098098eb8bef1a54731de7945507e89ccadb730aa0ea68f5a7b7a8f77aec84ba3891abff3fba9f9d6
-
SSDEEP
12288:yC66Bm2iNNRsdvtyAL7pYiRas42N4omRcXnUqMYjfCP66B:vVM1rRsdvzLjaSdh2PV
Malware Config
Extracted
formbook
4.1
cr63
kontorsprylar.com
efefeatable.buzz
gbmorningnews.online
bbntherapy.com
achmadsyafii.com
hrunmall7489.com
blurens-de.com
fadalinovaes.net
sahalenergy.com
486947.com
thelabresults.africa
ldkjcu8.vip
5t8nds.live
kapokbay.com
vieop.online
cristiebussey.com
exsharebuddy.com
back9grillclgc.com
danielsnetworkingsecurity.com
dutcode-xyz.net
rowtonconsulting.co.uk
cloudister.com
122856.com
jobsapplynowinco.com
omarkschoolofhealth.africa
thecomfypew.co.uk
bmncmnbbg.net
hair-transplantation-12561.com
coffeeman.dev
hopeatdawn.africa
clubederivais.com
ciaroc.com
chunksbakehouse.com
agdcustoms.com
getlinbit.com
game0708.com
idsoft.africa
cupalyst.com
jdmfjy.com
viktorweb.net
apartments-for-rent-35825.com
artistncrafter.com
gifts4him.online
efeftrot.buzz
bahador.pro
grandmacathy.com
arcsi2022.com
flex-workers.ch
chelseawallpaper.com
jobvacancy.shop
ajanshizmetleri.xyz
ominiwise.africa
karibupropertymanagement.net
lifeofphys.com
paddlesaipan.com
agrorx.ru
hausture.com
tls24.net
legderpets.com
gjzq7.com
dekorasyons.com
ogitechpay.africa
freude-zu-hause.ch
52lv.net
ekcsba.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1616-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1616-64-0x000000000041F090-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1616 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26 PID 1864 wrote to memory of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26 PID 1864 wrote to memory of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26 PID 1864 wrote to memory of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26 PID 1864 wrote to memory of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26 PID 1864 wrote to memory of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26 PID 1864 wrote to memory of 1616 1864 1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe"C:\Users\Admin\AppData\Local\Temp\1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe"C:\Users\Admin\AppData\Local\Temp\1bdc70b47e7a3cfd638eca937ad2117c53ac6cf9fe042cd46fcbc9971d06504f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-