Analysis
-
max time kernel
135s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe
Resource
win7-20230220-en
General
-
Target
f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe
-
Size
684KB
-
MD5
33b08a6f291d2d62ce11bc349ed3487d
-
SHA1
a06c3031d3098a51160179458f604b0382c26a16
-
SHA256
f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e
-
SHA512
a194432af284a2284cb7a2a8b18405e1d1b2a42057d8463d819ae1a00bdb98223a418c6017e5673bcb8d7a979bb716c35c560dcd86542baaca8e9f2e711617ae
-
SSDEEP
12288:YWda76TLGyuxNYZaOWiOBR7Eb1VW7YRkV42mEFdCH:YW3SVx2ZaqOB9W1qFXFUH
Malware Config
Extracted
formbook
4.1
e8fg
rmaex.xyz
thegreenambition.com
ifmcustomerevents.com
agencewebimage.com
w0a00dbe.buzz
shopbequynhff.com
webpetarung.online
girlgonecyber.com
lexoutwest.com
gramshilpartandcraft.com
kemeioficial.com
track-race-package.com
shop-domanopro.com
bohanshow.com
ateliermedispa.com
paragonhonda-ny.com
calzadosnova.com
thephoenixoneproject.com
pl66380.com
nightowlmarketinggroup.com
justthrillingdeals.com
bodylovebe.com
callaray.com
yp666666.com
astrologerkaranveer.com
newbalance-deutschland.com
cathfrei.com
happytailontrail.com
daihatsumedan.info
botflock.com
jumshow.life
ricolocobikes.com
kdramalike.com
aubedubd.info
getyournewhouse.com
a298c.com
travelswithabhi.com
flsaudiocreate.fun
scenicwirral.com
6a9uxu.com
mysong-yoursong.com
manyen.com
hondohaus.com
player9.stream
36292.win
amazing-channel.ru
superiorcleaners.info
chloezhaang.com
gvihx.com
regenliving.live
thunderbirdai.com
librosfantasia.net
deltacommunitycu-6t.com
optimizedproducts.net
luettig.tech
surfing.gay
tanushreesmakeover.com
liora-hotel.ru
zxl358.com
madeirahotwheels.com
maxlivingjacksonville.com
glowcircuit.com
apartamentoslassirenas.com
elevateyourlifeshop.com
itstopnotch.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1424-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2196 set thread context of 1424 2196 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 1424 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1424 2196 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 90 PID 2196 wrote to memory of 1424 2196 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 90 PID 2196 wrote to memory of 1424 2196 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 90 PID 2196 wrote to memory of 1424 2196 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 90 PID 2196 wrote to memory of 1424 2196 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 90 PID 2196 wrote to memory of 1424 2196 f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"C:\Users\Admin\AppData\Local\Temp\f877daae32612cf737745b22467c63f63e1961a6135289125dd228604fa0c29e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-