Analysis
-
max time kernel
32s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30/03/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
d9f11abb5fbd7478a8fe993cfe8aac52.exe
Resource
win7-20230220-en
General
-
Target
d9f11abb5fbd7478a8fe993cfe8aac52.exe
-
Size
762KB
-
MD5
d9f11abb5fbd7478a8fe993cfe8aac52
-
SHA1
4ef674f52ba7fb3d8f6ba2ddd2466b5da24b9b20
-
SHA256
91d502f918a232073359481d07dc7ba2d21b7675bcdc3e3cd0440f1cc9557833
-
SHA512
249691279cf3c7e04e757eb1300e88c748245f4cd5e5029fb9dd7eea6de943d7cf4b3dc831b8ce84b96f43e11300f2071b3d5c6866fbd436cc038fd53fd063bd
-
SSDEEP
12288:NQxxBLyywVex3ozH9eqFYLIIm3JkKNzXsle5Cocz6:NknwVegHsqFIliBzXs8
Malware Config
Extracted
formbook
4.1
ne28
basic-careitem.net
healstockton.com
groupetalentapro.com
geseconevent.com
adornmentwithadrienne.com
lazylynx.se
forestwerx.com
labishu.com
hilykan.com
beyondyoursenses.co.uk
inno-imc.com
driverrehab.online
mantlepies.co.uk
sicepat.net
kiwitownkids.com
infiniumsource.com
motorsolutionswithmakro.co.uk
6pg.shop
zijlont.xyz
corpusskencar.com
korthalsgriffonyorkshire.co.uk
hatchandneststudio.com
listestubenring.com
mynarcissist.co.uk
hfe2wr8zdi1.cfd
crackthecombination.com
cycw168.com
fren.pet
medicalcannabis.me.uk
locallooknh.com
dairecheese.com
celebrate.rsvp
foody-people.uk
11600yy.com
tuberider.africa
iamjlfreak.com
breadpartner.com
larrgestrreet.site
savethedateevents.uk
dongyoufood.com
jdmgarage.shop
commonthreadpatterns.com
ogadriver.africa
digitalfreakk.com
poshcompanyandsuites.net
gogh.live
easymediarealestate.com
brandpage.site
johnhallerconstruction.com
finemarken.com
dxyzcmag2020.com
greengrovetherapy.com
freshfruits.online
globalventureproject.info
themanxlobster.co.uk
conviord.com
goodpeoplegb1115.shop
christiesparis.com
pnc-verify-support1.com
cheerleader.social
forum-sanmonika.online
dulcescamus.com
thegolfteeshop.co.uk
dafabetvn.info
theredorchard.co.uk
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/268-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1204 set thread context of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 268 d9f11abb5fbd7478a8fe993cfe8aac52.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1204 wrote to memory of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28 PID 1204 wrote to memory of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28 PID 1204 wrote to memory of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28 PID 1204 wrote to memory of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28 PID 1204 wrote to memory of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28 PID 1204 wrote to memory of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28 PID 1204 wrote to memory of 268 1204 d9f11abb5fbd7478a8fe993cfe8aac52.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9f11abb5fbd7478a8fe993cfe8aac52.exe"C:\Users\Admin\AppData\Local\Temp\d9f11abb5fbd7478a8fe993cfe8aac52.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\d9f11abb5fbd7478a8fe993cfe8aac52.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:268
-