Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2023, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
452KB
-
MD5
fe889bf209a5e139d07c128c6d0ba877
-
SHA1
0946646c6c1e28d9c5e48636be2c9be24866ba41
-
SHA256
9242b1d497cf232d201183851b93b19046929e39e5e512b87ea42f616d0784a4
-
SHA512
f647a27816f41b9a2aadb7d65452f9109ae60e2954fc279a6d1d4c469e83459299dcdb75402744d995aacb7f7257f72c831980ba7003873043a73c655a09f4b6
-
SSDEEP
1536:2qDlPCJE7I2SCQv4M/2O1DV9SA9Nayp6kZJ4PnXnaQQvMMMMMM1MMMMMIG:1S39iuYXn1Q7G
Malware Config
Extracted
formbook
4.1
my28
family-doctor-74284.com
dublinsroofer.com
huangshi.info
learningpaths.site
enoidemusoro.africa
devcapcapacitor.com
hairbeaut.com
forgetourco.com
dekorexpressz.com
keminguesthouse.com
harstadbudtjeneste.com
49astleystreet.com
ldkj1sw.vip
mindfulchild.uk
doyuip.xyz
caseuspageamzoncustomer.com
caressentialz.co.uk
doitchannel.com
3dr8.xyz
clinrbn.ru
9969.voto
hjd04b.com
heruhome.net
dallerry.com
littleluxuriesstudio.info
davideal.com
hitidigital.net
cloudmgmt.xyz
12u.xyz
blc222.com
experiencelayover.com
bevietnamtours.com
nosamsung.rsvp
nelcscotland.org.uk
clientsaretheworst.com
konusmakkolay.com
externalpage.com
eoujkbvn.shop
learniq.uk
immernochlustig.com
7mesports.vip
bookttix.com
waterresources.africa
vikingsgate.net
faithloyalcargo.com
naijanewsnow.africa
7186.voto
lastpartyofyear.com
ahmedhussein.tech
adresimde.com
ajrcva.com
digileed.com
casa4ponto0.com
ki-ror.se
gosudz.com
higano-fe2.com
cyrexinc.com
aluv4water.fyi
interlink-msp.com
jclub33.vip
family-doctor-30030.com
028sczx.com
delpradoorthodontics.com
evolveregroup.co.uk
aspiresoothe.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1316-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1316-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1364-71-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1364-73-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2040 set thread context of 1316 2040 tmp.exe 28 PID 1316 set thread context of 1244 1316 MSBuild.exe 19 PID 1364 set thread context of 1244 1364 raserver.exe 19 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1316 MSBuild.exe 1316 MSBuild.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe 1364 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1316 MSBuild.exe 1316 MSBuild.exe 1316 MSBuild.exe 1364 raserver.exe 1364 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2040 tmp.exe Token: SeDebugPrivilege 1316 MSBuild.exe Token: SeDebugPrivilege 1364 raserver.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1316 2040 tmp.exe 28 PID 2040 wrote to memory of 1316 2040 tmp.exe 28 PID 2040 wrote to memory of 1316 2040 tmp.exe 28 PID 2040 wrote to memory of 1316 2040 tmp.exe 28 PID 2040 wrote to memory of 1316 2040 tmp.exe 28 PID 2040 wrote to memory of 1316 2040 tmp.exe 28 PID 2040 wrote to memory of 1316 2040 tmp.exe 28 PID 1244 wrote to memory of 1364 1244 Explorer.EXE 29 PID 1244 wrote to memory of 1364 1244 Explorer.EXE 29 PID 1244 wrote to memory of 1364 1244 Explorer.EXE 29 PID 1244 wrote to memory of 1364 1244 Explorer.EXE 29 PID 1364 wrote to memory of 300 1364 raserver.exe 30 PID 1364 wrote to memory of 300 1364 raserver.exe 30 PID 1364 wrote to memory of 300 1364 raserver.exe 30 PID 1364 wrote to memory of 300 1364 raserver.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:300
-
-