Analysis
-
max time kernel
151s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
605KB
-
MD5
cb62322bf94c2372c0c4c0383f3c2a23
-
SHA1
7b628d08dde66fe82002c908a1cdca11db5d54ed
-
SHA256
f641f1a87ee2a760b79417b410c52137c114e2618529bb90a0f281967975476e
-
SHA512
8a43cc7a3d2f6ebd5bd3bddc6577d435ac421697a3a8ca34074a29bdc716b589e87684e1cc5ae8d1007ef22e69e72cb0393c45c2f9f681fee3e0a7acec7f4237
-
SSDEEP
12288:FYmXlA7G3NFi0b7BMAsSMMT6sOhOIbw9SopRGdovnyo6VNglbXT:F5aS9Fi0b7BPl569I4p4G6vn32SbXT
Malware Config
Extracted
formbook
4.1
tf6p
poolcleanerskingsland.com
nieveslandscapee.com
wb263.com
smartlubetrading.com
linuowen.com
fna-seattle.com
jobgenie-ai.com
mycocktailmind.com
openai-invite.com
tnndjf5kyxz.com
mclane.attorney
somwear.xyz
spliffstudios.com
grupofaace.com
wuuwo.com
bigtimerushcharlotte.com
yourercchecks.com
arportablepottyrentals.biz
sbtsanantonio.com
explantationsbegleitung.com
nuovoclean.com
quarrybay.info
artworktile.com
excellprint-promotions.com
boogle.house
viewr.studio
bookkeeper4doctors.com
ecliq.info
thebestforyouofficial.site
jempropertylogistics.com
qthereumgift.cards
gejayaninnova.com
hadiyahofficial.com
muenz-schuhfabrik.com
humbledogs.net
gratisknolpowermerch.online
h6myq213wmg.net
fsig.net
eventrevolution.agency
winelandtv.com
cascadesoundscapes.com
sqpsora.london
bmcinternet.com
suafaturashipercard.com
aproaremos.click
cision.care
678w.vip
prologictechnologiesinc.com
clarasecurity.com
consomieux.net
privatemessengerapp.com
rentandgoponce.com
recharge-band.com
amtasguopmn.buzz
cemarkt.net
jfqa.top
sonicproton.com
modisolve.com
5rg1osts3.cfd
flweber.online
only1hookups.online
simplysmell.com
cj-life.art
hallspropertyenhancements.com
danvillehousecleaning.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3612-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3612-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1636-149-0x0000000000510000-0x000000000053F000-memory.dmp formbook behavioral2/memory/1636-151-0x0000000000510000-0x000000000053F000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 58 1636 cmstp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3588 set thread context of 3612 3588 tmp.exe 85 PID 3612 set thread context of 3160 3612 tmp.exe 43 PID 1636 set thread context of 3160 1636 cmstp.exe 43 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3612 tmp.exe 3612 tmp.exe 3612 tmp.exe 3612 tmp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe 1636 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3160 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3612 tmp.exe 3612 tmp.exe 3612 tmp.exe 1636 cmstp.exe 1636 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3612 tmp.exe Token: SeDebugPrivilege 1636 cmstp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3612 3588 tmp.exe 85 PID 3588 wrote to memory of 3612 3588 tmp.exe 85 PID 3588 wrote to memory of 3612 3588 tmp.exe 85 PID 3588 wrote to memory of 3612 3588 tmp.exe 85 PID 3588 wrote to memory of 3612 3588 tmp.exe 85 PID 3588 wrote to memory of 3612 3588 tmp.exe 85 PID 3160 wrote to memory of 1636 3160 Explorer.EXE 86 PID 3160 wrote to memory of 1636 3160 Explorer.EXE 86 PID 3160 wrote to memory of 1636 3160 Explorer.EXE 86 PID 1636 wrote to memory of 4996 1636 cmstp.exe 87 PID 1636 wrote to memory of 4996 1636 cmstp.exe 87 PID 1636 wrote to memory of 4996 1636 cmstp.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:4996
-
-