Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
5bc95f5d8d3bf878098d8527bc679545.exe
Resource
win7-20230220-en
General
-
Target
5bc95f5d8d3bf878098d8527bc679545.exe
-
Size
680KB
-
MD5
5bc95f5d8d3bf878098d8527bc679545
-
SHA1
88611ceeb815ac8f33599a2b6ab8ac6259621260
-
SHA256
9c3d5704da83029f78ee8cf532c746cd04834f5375a698f21c50040ade6c5a09
-
SHA512
cf536998a992d89b78e16e6add5d901ef4383558a499f93adb5c978967f2d260c8e60487ffbafcc6094f2ae60214612696c27c7fe560808450727493801e082e
-
SSDEEP
12288:LBdsgj8Qph9X8ADOlBRUP+FKfY+EMlwpk5n5Hnll:HBj8G38Jr6cx+yWLnj
Malware Config
Extracted
formbook
4.1
ks01
glchqx.com
acpwatertreatment.co.uk
hannahschepmann.com
cvcv49.top
crazy-for-promotion.online
goldstreamacademy.africa
erasure.monster
judiangka.boats
fli.group
94ebuy.com
enjoyvet.com
box618.shop
formdr.dev
rivierabathrooms.co.uk
drawntocolour.com
digitalworldobserver.com
lonelinessindex.com
coachifyfunnels.com
abeloewen.com
bahujan.store
thenergy.africa
cloudninemodels.co.uk
arrogan.tech
teamobjective.com
fantasydoors1.com
eternityalcala.com
hustlersmall.com
cuisineasianlovers.com
samefood.co.uk
cececom.online
livingelevenbeautybrands.com
chrleesgifts.net
inspirepropertiesraleigh.com
jingsha-machine.com
champagnenbox.com
dkozinov.ru
honestjohnsmoving.com
vzxtopi.xyz
hartree.xyz
hourensou01292.com
sustainalistapothecary.com
xquizitwebsites.africa
alhajas-gourmet.com
empresasbs2web.com
tazwid.net
neighborhub.net
integratedbrite.space
travelinggenie.net
driesengard.com
eyelid.life
jetgiris.live
buickgmcgreenbrier.com
hallmarkcontractors.africa
coconutrealtors.com
constructionwoodfloorsgr.net
astraledo.ru
keremacar.net
kx1358.com
yumgapyf.net
findmaps-br.info
antojitosecuador.com
jonamicrolending.africa
fischer-mallorca.com
decantmiss.com
gevorceperience.site
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4732-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4564 set thread context of 4732 4564 5bc95f5d8d3bf878098d8527bc679545.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4732 5bc95f5d8d3bf878098d8527bc679545.exe 4732 5bc95f5d8d3bf878098d8527bc679545.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4732 4564 5bc95f5d8d3bf878098d8527bc679545.exe 96 PID 4564 wrote to memory of 4732 4564 5bc95f5d8d3bf878098d8527bc679545.exe 96 PID 4564 wrote to memory of 4732 4564 5bc95f5d8d3bf878098d8527bc679545.exe 96 PID 4564 wrote to memory of 4732 4564 5bc95f5d8d3bf878098d8527bc679545.exe 96 PID 4564 wrote to memory of 4732 4564 5bc95f5d8d3bf878098d8527bc679545.exe 96 PID 4564 wrote to memory of 4732 4564 5bc95f5d8d3bf878098d8527bc679545.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bc95f5d8d3bf878098d8527bc679545.exe"C:\Users\Admin\AppData\Local\Temp\5bc95f5d8d3bf878098d8527bc679545.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\5bc95f5d8d3bf878098d8527bc679545.exe"C:\Users\Admin\AppData\Local\Temp\5bc95f5d8d3bf878098d8527bc679545.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-