Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
372daff38ea8b876b01803b474c7f687.exe
Resource
win7-20230220-en
General
-
Target
372daff38ea8b876b01803b474c7f687.exe
-
Size
906KB
-
MD5
372daff38ea8b876b01803b474c7f687
-
SHA1
3e27eb6a6e9ec8f8be6609c85bb6b16376907fcf
-
SHA256
625f5caa0e4422a01de12f875b7acf8c4edb699f36a7237c18bf3df7772a7e6c
-
SHA512
9a27b0c2f7f3bd66f30f2bffbde4c44d82b541ade528c034ba1cd4f0facd89d472a98550834b8cf79b67a40afd50dd5eb02cd87dacc161c6a88b2b26a0eb87e6
-
SSDEEP
24576:C0t8P0kqs+kTIvMRGfdx9YLXy+DB87qkC:IP01sWMRGfHuXy+Dx
Malware Config
Extracted
formbook
4.1
gg04
clothandsoulfabricllc.com
kx1336.com
4638.global
fixlaunchcredtunionmemb.online
indivexport.com
betuluzun.online
colossusboutique.com
hgcst.com
authorizer.online
hong-travel.com
globalwealthstrategiesco.com
fobberq.com
tribally.net
cook-a.com
todipjane.africa
membershipexams.africa
3dseal.online
abris-spb.ru
mkkkkk.net
chargecentral.store
chaudhrytraders.com
kooperatifemlak.com
cutematxhy.com
kasoraenterprises.com
juicydisco.app
bryconbenefits.com
kaleebet955.xyz
gfxadeel.tech
hanyawiki.xyz
vineuse.co.uk
dgoguincho.net
kngm-metall.ru
anime-room.com
clients-web.com
freeadmissiontickets.com
ctxlab.online
ds85.top
glossaryfashions.com
threesome.africa
invictusbr.online
dinyu001.com
cilumer.com
internationalfreight.tech
choicetricker.com
lukasladistores.africa
data-analyticsdegree.com
downloadtemplate.site
acebit.xyz
sunliftathleisure.com
socialunites.org.uk
4483.uk
aboutmeclothes.online
lovetext.africa
luieshop.com
xn--opoderosodogo-7eb.app
buggsfurniture.com
fanslylove.com
estockuk.co.uk
linkonweb.com
customscubadiving.com
sxcontu.xyz
thetobacconist.africa
africansinuk.co.uk
havenadvisorypartners.net
coquitoweek.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5020-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5012 set thread context of 5020 5012 372daff38ea8b876b01803b474c7f687.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5020 372daff38ea8b876b01803b474c7f687.exe 5020 372daff38ea8b876b01803b474c7f687.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5012 wrote to memory of 5020 5012 372daff38ea8b876b01803b474c7f687.exe 88 PID 5012 wrote to memory of 5020 5012 372daff38ea8b876b01803b474c7f687.exe 88 PID 5012 wrote to memory of 5020 5012 372daff38ea8b876b01803b474c7f687.exe 88 PID 5012 wrote to memory of 5020 5012 372daff38ea8b876b01803b474c7f687.exe 88 PID 5012 wrote to memory of 5020 5012 372daff38ea8b876b01803b474c7f687.exe 88 PID 5012 wrote to memory of 5020 5012 372daff38ea8b876b01803b474c7f687.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-