Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
shipment document_for your review_2543846930.exe
Resource
win7-20230220-en
General
-
Target
shipment document_for your review_2543846930.exe
-
Size
730KB
-
MD5
daf38969ea84ef75b59a19518ecb825c
-
SHA1
ffad234dfc77ff46bd7872cf469823cc33c719c0
-
SHA256
bd407e66453e00d96368122b1d8761c995aa3a9606995dbd46ec1629debb18ed
-
SHA512
22812c7dac0d6c5344edd45b81f455945f670c656384f386cb1fe9fafa6331a7862e985374f23b4cbc7d57e2e73b890be1c539009d12f677f38a8b6831ad78cd
-
SSDEEP
12288:uDiE3lkHMH91DzZZlEOfaNbv6dxx99WKvkdsua9cFcPVl/4A/pH:uDlkHMd1DtXANbvkt9WKusuhFcPVxVH
Malware Config
Extracted
formbook
4.1
c29i
chrestheryulelog.com
awesomecustomerservice.com
4455m.net
vonek76k.com
zwelishaprojects.africa
bbangnmoolgogi.com
howickmenswears.com
ba225.com
ipl2018livescore.com
ohprovider.co.uk
handymanservices.shop
1wzxtq.top
busy-people-gifts.com
invited.rsvp
heihei.fun
micloudlogin.page
hwyi1319.com
alitechnologyes.com
hysminai.com
liuyikj.com
709ai7d.store
burgerking.africa
debrislabs.xyz
live2024americanelection.com
versfeldboerdery.africa
dragonschristmas.com
bestway2.shop
cceasybuy.com
instantboost.africa
allianzcolombiana.com
fghre.com
iweb5logmt.com
efefsquirrel.buzz
nkechi.africa
garotospodres.com
corleanat.com
jamespadilladesigns.com
2022xin27.bar
bmardius.com
emstruckandtrailerrepair.com
gossitup.com
1wxsfy.top
danilov-geo.ru
jio6v.com
cell-phone-discover-now.life
hokahouse.top
gazmks.ru
jjssalonconcepts.com
icconnectors.icu
flavaflamez.shop
boudoirnxt.com
jennyslaughlovenation.online
investoren-projekte.com
feefree.net
aleutiancapitaltemp.com
kishoreganjpratidin.online
66y121.xyz
alphaoomega.academy
delitedentalclinic.com
027hq.net
kromaconstruction.com
dvtekhv.ru
aoiunionbank.com
masxot.xyz
01-buy.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/384-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/384-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4176-150-0x0000000000CC0000-0x0000000000CEF000-memory.dmp formbook behavioral2/memory/4176-152-0x0000000000CC0000-0x0000000000CEF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4260 set thread context of 384 4260 shipment document_for your review_2543846930.exe 92 PID 384 set thread context of 3188 384 shipment document_for your review_2543846930.exe 55 PID 4176 set thread context of 3188 4176 raserver.exe 55 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 384 shipment document_for your review_2543846930.exe 384 shipment document_for your review_2543846930.exe 384 shipment document_for your review_2543846930.exe 384 shipment document_for your review_2543846930.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe 4176 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3188 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 384 shipment document_for your review_2543846930.exe 384 shipment document_for your review_2543846930.exe 384 shipment document_for your review_2543846930.exe 4176 raserver.exe 4176 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 384 shipment document_for your review_2543846930.exe Token: SeDebugPrivilege 4176 raserver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4260 wrote to memory of 384 4260 shipment document_for your review_2543846930.exe 92 PID 4260 wrote to memory of 384 4260 shipment document_for your review_2543846930.exe 92 PID 4260 wrote to memory of 384 4260 shipment document_for your review_2543846930.exe 92 PID 4260 wrote to memory of 384 4260 shipment document_for your review_2543846930.exe 92 PID 4260 wrote to memory of 384 4260 shipment document_for your review_2543846930.exe 92 PID 4260 wrote to memory of 384 4260 shipment document_for your review_2543846930.exe 92 PID 3188 wrote to memory of 4176 3188 Explorer.EXE 93 PID 3188 wrote to memory of 4176 3188 Explorer.EXE 93 PID 3188 wrote to memory of 4176 3188 Explorer.EXE 93 PID 4176 wrote to memory of 1176 4176 raserver.exe 94 PID 4176 wrote to memory of 1176 4176 raserver.exe 94 PID 4176 wrote to memory of 1176 4176 raserver.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\shipment document_for your review_2543846930.exe"C:\Users\Admin\AppData\Local\Temp\shipment document_for your review_2543846930.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\shipment document_for your review_2543846930.exe"C:\Users\Admin\AppData\Local\Temp\shipment document_for your review_2543846930.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:384
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\shipment document_for your review_2543846930.exe"3⤵PID:1176
-
-