Analysis
-
max time kernel
49s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe
Resource
win7-20230220-en
General
-
Target
f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe
-
Size
684KB
-
MD5
33b08a6f291d2d62ce11bc349ed3487d
-
SHA1
a06c3031d3098a51160179458f604b0382c26a16
-
SHA256
f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e
-
SHA512
a194432af284a2284cb7a2a8b18405e1d1b2a42057d8463d819ae1a00bdb98223a418c6017e5673bcb8d7a979bb716c35c560dcd86542baaca8e9f2e711617ae
-
SSDEEP
12288:YWda76TLGyuxNYZaOWiOBR7Eb1VW7YRkV42mEFdCH:YW3SVx2ZaqOB9W1qFXFUH
Malware Config
Extracted
formbook
4.1
e8fg
rmaex.xyz
thegreenambition.com
ifmcustomerevents.com
agencewebimage.com
w0a00dbe.buzz
shopbequynhff.com
webpetarung.online
girlgonecyber.com
lexoutwest.com
gramshilpartandcraft.com
kemeioficial.com
track-race-package.com
shop-domanopro.com
bohanshow.com
ateliermedispa.com
paragonhonda-ny.com
calzadosnova.com
thephoenixoneproject.com
pl66380.com
nightowlmarketinggroup.com
justthrillingdeals.com
bodylovebe.com
callaray.com
yp666666.com
astrologerkaranveer.com
newbalance-deutschland.com
cathfrei.com
happytailontrail.com
daihatsumedan.info
botflock.com
jumshow.life
ricolocobikes.com
kdramalike.com
aubedubd.info
getyournewhouse.com
a298c.com
travelswithabhi.com
flsaudiocreate.fun
scenicwirral.com
6a9uxu.com
mysong-yoursong.com
manyen.com
hondohaus.com
player9.stream
36292.win
amazing-channel.ru
superiorcleaners.info
chloezhaang.com
gvihx.com
regenliving.live
thunderbirdai.com
librosfantasia.net
deltacommunitycu-6t.com
optimizedproducts.net
luettig.tech
surfing.gay
tanushreesmakeover.com
liora-hotel.ru
zxl358.com
madeirahotwheels.com
maxlivingjacksonville.com
glowcircuit.com
apartamentoslassirenas.com
elevateyourlifeshop.com
itstopnotch.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/588-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1312 set thread context of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 588 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1480 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 28 PID 1312 wrote to memory of 1480 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 28 PID 1312 wrote to memory of 1480 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 28 PID 1312 wrote to memory of 1480 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 28 PID 1312 wrote to memory of 1912 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 29 PID 1312 wrote to memory of 1912 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 29 PID 1312 wrote to memory of 1912 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 29 PID 1312 wrote to memory of 1912 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 29 PID 1312 wrote to memory of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30 PID 1312 wrote to memory of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30 PID 1312 wrote to memory of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30 PID 1312 wrote to memory of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30 PID 1312 wrote to memory of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30 PID 1312 wrote to memory of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30 PID 1312 wrote to memory of 588 1312 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"2⤵PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"2⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:588
-