Analysis
-
max time kernel
99s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2023 15:45
Static task
static1
General
-
Target
5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe
-
Size
761KB
-
MD5
0d9b2efac64b4245292e7c3112ec8771
-
SHA1
61b32ec6303fd7fa890dadc3f3f18128f2c264c9
-
SHA256
5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37
-
SHA512
47d00d1a6e705662d18fb3a9885af5a8a51ad3ef4ad3bbbcabf544e5b9a959dc49be99fdea562ff6db59981941db91de761d7f3dbf59ccaaa12a9a35357081ed
-
SSDEEP
12288:QCZzLzeEILPryAzRVelrKhVaZF6NPeUDQ1cwCbGOaS80v2ekdeoFuPD7hXJGRTw:QCZzeEIrryORVep2QF6N/Q1bWGDTFmJT
Malware Config
Extracted
formbook
4.1
ar73
classgorilla.com
b6817.com
1wwuwa.top
dgslimited.africa
deepwaterships.com
hkshshoptw.shop
hurricanevalleyatvjamboree.com
ckpconsulting.com
laojiangmath.com
authenticityhacking.com
family-doctor-53205.com
investinstgeorgeut.com
lithoearthsolution.africa
quickhealcareltd.co.uk
delightkgrillw.top
freezeclosettoilet.com
coo1star.com
gemgamut.com
enrichednetworksolutions.com
betterbeeclean.com
kbmstr.com
colorusainc.com
five-dollar-meals.com
baozhuang8.com
la-home-service.com
innovantexclusive.com
chateaudevillars.co.uk
echadholisticbar.com
naijacarprices.africa
4652.voto
kraftheonz.com
ingrambaby.com
braeunungsoel.ch
sweetcariadgifts.co.uk
kui693.com
akatov-top.ru
epollresearch.online
cupandsaucybooks.com
arredobagno.club
gt.sale
dskincare.com
cursosemcasa.site
leaf-spa.net
deathbeforedeceit.com
azvvs.com
laptops-39165.com
ccwt.vip
011965.com
mtevz.online
jacksontcpassettlement.com
aldeajerusalen.com
kellnovaglobalfood.info
alphametatek.online
lcssthh.com
dumelogold9ja.africa
d-storic.com
mogi.africa
ghostt.net
aksharsigns.online
goglucofort.com
b708.com
controlplus.systems
lightandstory.info
invstcai.sbs
2348x.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1328-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exedescription pid process target process PID 3592 set thread context of 1328 3592 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exepid process 1328 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 1328 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exedescription pid process target process PID 3592 wrote to memory of 1328 3592 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe PID 3592 wrote to memory of 1328 3592 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe PID 3592 wrote to memory of 1328 3592 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe PID 3592 wrote to memory of 1328 3592 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe PID 3592 wrote to memory of 1328 3592 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe PID 3592 wrote to memory of 1328 3592 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe 5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe"C:\Users\Admin\AppData\Local\Temp\5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe"C:\Users\Admin\AppData\Local\Temp\5dc52da7b97835654bab2a3a39e93d412a50608bfd7dfccb87ff716c9aba6a37.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1328-140-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1328-142-0x0000000000F00000-0x000000000124A000-memory.dmpFilesize
3.3MB
-
memory/3592-133-0x00000000009E0000-0x0000000000AA4000-memory.dmpFilesize
784KB
-
memory/3592-134-0x0000000005A60000-0x0000000006004000-memory.dmpFilesize
5.6MB
-
memory/3592-135-0x00000000054B0000-0x0000000005542000-memory.dmpFilesize
584KB
-
memory/3592-136-0x00000000056F0000-0x0000000005700000-memory.dmpFilesize
64KB
-
memory/3592-137-0x0000000005460000-0x000000000546A000-memory.dmpFilesize
40KB
-
memory/3592-138-0x00000000056F0000-0x0000000005700000-memory.dmpFilesize
64KB
-
memory/3592-139-0x0000000006D70000-0x0000000006E0C000-memory.dmpFilesize
624KB