Analysis
-
max time kernel
58s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:47
Static task
static1
Behavioral task
behavioral1
Sample
e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe
Resource
win7-20230220-en
General
-
Target
e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe
-
Size
744KB
-
MD5
d24b6d72e85c9b51bd5b39b9fe6d1ab5
-
SHA1
b2c1c8c1988924942a231cf30dfc5222b031090e
-
SHA256
e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5
-
SHA512
d37ff374ab0f381051e8e1c27d4b181a57e62fa3f8775616739421261b7032f94ec229b84c0f0a686bbbce95f69e7a2b2a0269239773c7dc76ff0f01ce8c9b6e
-
SSDEEP
12288:iQu6zWFuIRiPLFuJVygB1VrQ6GSItioHVnwlb1:iSIuIwZwAgrVr6NHFwlb
Malware Config
Extracted
formbook
4.1
n13e
cowiemarketing.com
uniqueliquidz.co.uk
755259.com
7bw95.com
luxbarstools.co.uk
baccaratda.com
berkayakpinar.xyz
gistus.africa
hjd387.com
leave-fly.com
golfclubdaddy.com
engineeringea.buzz
countryrevisited.com
decoracioneskalite.com
imaginationlirbary.com
moneytransfer.africa
brainwaveproject.com
3039sjbqf2022.com
184hotels.com
aromamiaro.com
bigching.com
armkette.com
energytechnicalsystems.com
bodw2022.com
keptpasha.online
fossillandstone.com
guioueui.link
cleanupbycmw.com
inyeculinary.com
papercrochet.net
jaderoadfarm.com
bril-leadinginvention.com
dtgwarehouse.com
successrn.net
660web.com
lovedhug.com
juicecomedy.co.uk
enigmaxk.com
romunro.net
cassiekayreads.com
ibuycomputers.com
blossomblushbelltents.co.uk
hjce06.com
applyingdreams.com
h2ghb3.site
glown.africa
533671.com
charlottechoicelimos.com
bossinfra.com
anrovlp.xyz
1wqzsb.top
ertfsdf.xyz
exotico-store.com
betterportions.com
corfix.app
888sq.club
takeselfies.net
getyourtitleback.com
clickadega.com
midwestflowsproductions.net
duraveritaswines.com
dublintwist.com
apollobenfitservices.com
kp-aodeli.com
davidmchughroofing.co.uk
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/672-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exedescription pid process target process PID 2000 set thread context of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exepid process 672 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exedescription pid process target process PID 2000 wrote to memory of 788 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe schtasks.exe PID 2000 wrote to memory of 788 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe schtasks.exe PID 2000 wrote to memory of 788 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe schtasks.exe PID 2000 wrote to memory of 788 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe schtasks.exe PID 2000 wrote to memory of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe PID 2000 wrote to memory of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe PID 2000 wrote to memory of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe PID 2000 wrote to memory of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe PID 2000 wrote to memory of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe PID 2000 wrote to memory of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe PID 2000 wrote to memory of 672 2000 e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe"C:\Users\Admin\AppData\Local\Temp\e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\urCbmGUnZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC543.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\e9ac57e43f65115bb0e5780178dae36d3a625cf21a21d6b9272d7a067c9c52a5.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC543.tmpFilesize
1KB
MD5bba387325676bf90f251afcab635c3b2
SHA1cae313d2b6e919bd617a04178a78e49df6c5ebd0
SHA25674665cc8148ca99d4bad5f4aeb371e24a9ef4760b820eb61a8c7e9d6b39b7d87
SHA5127032c3d03f9639191c739c425ced0322b8fb4e5d9433279844e7913ac5427852eeb2755e08ffac55beb79aa025e6ee79ccf05b4839ea245c5113bc1a89dd6ba9
-
memory/672-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/672-64-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/672-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/672-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/672-67-0x0000000000BB0000-0x0000000000EB3000-memory.dmpFilesize
3.0MB
-
memory/2000-54-0x0000000000850000-0x0000000000910000-memory.dmpFilesize
768KB
-
memory/2000-55-0x0000000002220000-0x0000000002260000-memory.dmpFilesize
256KB
-
memory/2000-56-0x00000000002C0000-0x00000000002CC000-memory.dmpFilesize
48KB
-
memory/2000-57-0x0000000002220000-0x0000000002260000-memory.dmpFilesize
256KB
-
memory/2000-58-0x0000000005200000-0x0000000005288000-memory.dmpFilesize
544KB
-
memory/2000-59-0x0000000002150000-0x0000000002184000-memory.dmpFilesize
208KB