Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
4.exe
Resource
win7-20230220-en
General
-
Target
4.exe
-
Size
718KB
-
MD5
707a20ef6a4ecee999425ed06eb6ffdf
-
SHA1
87369729f482701c499ea4e3b1efd37a1bccaa62
-
SHA256
6d50601e8d4511ec20311b70ae15730af45a5d2bc9275ed8c102ebba9332937a
-
SHA512
657778b88546d69b0df6018c44d6b21359ad95f7813eccd3a0b51aeadd696ccc5ae7021855ff7bf5c81ececdbe28b3b338c902217a81283399365a99654ee381
-
SSDEEP
12288:DvV+s1bSQT6tjjdB4Jobube9QUjR853Zs2pAPv2sR01PU8DRbW0z/L0+jqeL:Dt3cube9xRsC262U4sYD0+HL
Malware Config
Extracted
formbook
4.1
an94
thehouseofdiversity.uk
ftxalamedascam.com
avtohisa.com
elywardrobe.com
leapnt.com
cheryljgreen.xyz
villapep.co.uk
prix.app
spbglobal.net
976768.com
xinxin159.com
grmchardygates.co.uk
caressentialz.co.uk
anraokm.top
btagger.ru
eaimmigration.com
tdassassin.app
minigardeners.co.uk
levictoriaclub.com
yedid.africa
suliov.online
bba188.com
foresightconsultinggroup.net
beachsidecentralinc.com
wolfpire.africa
driftwoodgalleries.co.uk
56368.site
burdacoconsulting.com
altisse.com
emagshoponline.com
carpentrybysi.com
cookiesseedsbankz.com
jaybthefilminist.com
celsia.net
imtai.dev
henlomax.com
ukhusiinternetcafe.africa
modrenfoods.net
bla.africa
kx2589.com
lambethcareers.co.uk
bvmpsh.xyz
08n0.com
withinourwounds.com
jsc3355.com
65hl.com
dominance.cfd
boldyfast.com
andrewtatenation.com
halloanwalt.cloud
dtgif.com
kay-home.com
effective-dry-eye-drops.space
flaginstallation.com
80020blr.com
dreamposting.com
somersetcorp.co.uk
lessecretsdesab.com
alinhavandosonhos.com
theuniqueshop.africa
bril-kre-l29.buzz
gestunlimit.online
amoorebooks.com
woods-red.net
webdesigngauteng.africa
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1028-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1028-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1028-72-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/572-75-0x0000000000070000-0x000000000009F000-memory.dmp formbook behavioral1/memory/572-77-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1488 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1208 set thread context of 1028 1208 4.exe 28 PID 1028 set thread context of 1312 1028 4.exe 16 PID 1028 set thread context of 1312 1028 4.exe 16 PID 572 set thread context of 1312 572 cscript.exe 16 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1028 4.exe 1028 4.exe 1028 4.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1312 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1028 4.exe 1028 4.exe 1028 4.exe 1028 4.exe 572 cscript.exe 572 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1028 4.exe Token: SeDebugPrivilege 572 cscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1028 1208 4.exe 28 PID 1208 wrote to memory of 1028 1208 4.exe 28 PID 1208 wrote to memory of 1028 1208 4.exe 28 PID 1208 wrote to memory of 1028 1208 4.exe 28 PID 1208 wrote to memory of 1028 1208 4.exe 28 PID 1208 wrote to memory of 1028 1208 4.exe 28 PID 1208 wrote to memory of 1028 1208 4.exe 28 PID 1312 wrote to memory of 572 1312 Explorer.EXE 29 PID 1312 wrote to memory of 572 1312 Explorer.EXE 29 PID 1312 wrote to memory of 572 1312 Explorer.EXE 29 PID 1312 wrote to memory of 572 1312 Explorer.EXE 29 PID 572 wrote to memory of 1488 572 cscript.exe 30 PID 572 wrote to memory of 1488 572 cscript.exe 30 PID 572 wrote to memory of 1488 572 cscript.exe 30 PID 572 wrote to memory of 1488 572 cscript.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Deletes itself
PID:1488
-
-