Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
INVS #14320023.exe
Resource
win7-20230220-en
General
-
Target
INVS #14320023.exe
-
Size
832KB
-
MD5
5e87bb63fb7409f0de2dbc75fb2500a4
-
SHA1
5d3d56dfa64c89905fcf0b4386fca6eb2bb452de
-
SHA256
9cd7ca54fc2b418d2f82093ed798cdd02478830c5b3fb956e59dd2d325e55682
-
SHA512
54bf90406ba1a71b5e824173e54a94f924301c8d0fefc254872400fb6e2dafe5deff1c5bc6f4df4f2f0feaca131e24caa18e46bd98bac9ff2b0ec1fcb1cfff55
-
SSDEEP
12288:0zAuodiJGRTwdW1bjsMluDOmaPrkTQWvmi8suUq2Lz3Xp2cHUwJ8ER06nghD:aoYJTsVpuDOmkomsBz3Xp2qJjR06n
Malware Config
Extracted
formbook
4.1
dr62
juanbrujo.com
toptasker.africa
g-labs.one
1redbuckpermonth.com
lasolutions.online
beginagainmen.com
iearn.site
leading-car.ru
codigosindiabetes.fun
6y8ud.bond
fptmarket.shop
ctjhxv3.vip
huluxia2.xyz
piggg08.uk
kms-pico-tools.com
westonandcate.com
giftrendz.com
kqwdhrendfywefdst.top
anchitchoudhary.com
sistemodasi.net
dotcomsolutions.co.uk
anastaciachetty.com
czh.ink
complete-energy-performance.com
kollanjurarna.se
anotherdaythelabel.com
fengkoo.com
sunsongproductions20.com
horhog.com
chq-1.com
cryptogame.rsvp
jjzb10a.xyz
raffletokens.com
djmikehall.com
baychocolates.online
ecoskiusa.com
myenergyusage.co.uk
lipcarehub.africa
isstrainingaz.com
engagementbuzz.com
jordanheritagita.online
cheaphockeysticks.com
rodeosonline.uk
access247connect.info
85putao.com
josefa.wien
pilcoh.online
apothakeehair.com
danadelseck.com
dslimme.com
alacatimacunu.com
caplesssociety.com
creativeirishgfts.com
blografie.com
hamfoods.com
ballonstunisie.com
jingduxueyue.site
goldoholic.com
millennialcore.net
tacairservice.com
betheme.shop
bathroadtraders.co.uk
jas757.com
crossovers-82617.com
573415.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4604-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4604-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1676-149-0x00000000005C0000-0x00000000005EF000-memory.dmp formbook behavioral2/memory/1676-151-0x00000000005C0000-0x00000000005EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2200 set thread context of 4604 2200 INVS #14320023.exe 95 PID 4604 set thread context of 3144 4604 INVS #14320023.exe 70 PID 1676 set thread context of 3144 1676 NETSTAT.EXE 70 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1676 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4604 INVS #14320023.exe 4604 INVS #14320023.exe 4604 INVS #14320023.exe 4604 INVS #14320023.exe 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE 1676 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3144 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4604 INVS #14320023.exe 4604 INVS #14320023.exe 4604 INVS #14320023.exe 1676 NETSTAT.EXE 1676 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4604 INVS #14320023.exe Token: SeDebugPrivilege 1676 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2200 wrote to memory of 4604 2200 INVS #14320023.exe 95 PID 2200 wrote to memory of 4604 2200 INVS #14320023.exe 95 PID 2200 wrote to memory of 4604 2200 INVS #14320023.exe 95 PID 2200 wrote to memory of 4604 2200 INVS #14320023.exe 95 PID 2200 wrote to memory of 4604 2200 INVS #14320023.exe 95 PID 2200 wrote to memory of 4604 2200 INVS #14320023.exe 95 PID 3144 wrote to memory of 1676 3144 Explorer.EXE 96 PID 3144 wrote to memory of 1676 3144 Explorer.EXE 96 PID 3144 wrote to memory of 1676 3144 Explorer.EXE 96 PID 1676 wrote to memory of 1440 1676 NETSTAT.EXE 97 PID 1676 wrote to memory of 1440 1676 NETSTAT.EXE 97 PID 1676 wrote to memory of 1440 1676 NETSTAT.EXE 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\INVS #14320023.exe"C:\Users\Admin\AppData\Local\Temp\INVS #14320023.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\INVS #14320023.exe"C:\Users\Admin\AppData\Local\Temp\INVS #14320023.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INVS #14320023.exe"3⤵PID:1440
-
-