Analysis
-
max time kernel
104s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2023, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe
Resource
win7-20230220-en
General
-
Target
f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe
-
Size
623KB
-
MD5
c563ac9781f5dd0b8a701d8a57029194
-
SHA1
ae23bd161690cc42cdfb2b2220bcf15992ae175a
-
SHA256
f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa
-
SHA512
d064de28a89d2241052a866c0591f042e58d944b9118cf7238d283c6704775d09235f1fbd10a176fc4719d04180953ce786287a760ca77baa2894e129fb84116
-
SSDEEP
12288:U2N8jiZ4zypIPjtPplTY6RhKu5wMS2lEs/cLFCQDgYCnrz2RzSjpUUfIp1qO58O/:U2N8jiZ4zypIPjJTDEkSVsDQD4rz2KJ6
Malware Config
Extracted
formbook
4.1
q6at
xn--oceanslot88-b28qq03g.xyz
kickui.xyz
my13377.com
exiipurediscount.pics
forevigt.shop
powerfivevolleyballclub.com
orcastones.com
dravloy.xyz
tokathaberajans.fun
cendanab3t.site
lonelylovercrew.com
beaubambi.com
thetalkaboutgriefproject.com
broadalert.com
promocodeforcrocs.com
sespeciess.club
lesjardinsdepoigny.com
intrack.site
bnbstar.live
electbraxton.com
rodlaverarena.com
goyan.net
future-system.shop
enternia.com
tiantian-trd.com
foreveryours.online
godisonline.store
tradechoicecfs.com
seguridad-bamkofamerica.online
recargatumobillyxz.xyz
everestglobal.digital
cebulottery.one
cihcs.buzz
andreforschoolboard.com
michealnapoleon.shop
musicnetwork.xyz
julyevens.com
ravindra.mobi
semeliamilano.com
chengzi.quest
lqwjmy.com
9wz71q29jr.com
automaticsalesgroup.com
playfortuna-zd.top
ctyioyop15.com
visiting-jordan.com
axioshealthcare.biz
topgradepaving.biz
dosservices.com
usa-it.com
metatolets.com
sjzbkws.com
orgstats-app.com
mikelantonio.com
staffology.us
c2sauce.com
ulylashes.com
lashxbrowslounge.com
ringdrive.website
tinksminksnthings.com
climatechangecoaching.online
22able09biz25.fun
801rrr.com
md-0086.xyz
xtraangel.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2164-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 2164 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 95 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 2164 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 2164 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2036 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 92 PID 5068 wrote to memory of 2036 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 92 PID 5068 wrote to memory of 2036 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 92 PID 5068 wrote to memory of 2312 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 93 PID 5068 wrote to memory of 2312 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 93 PID 5068 wrote to memory of 2312 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 93 PID 5068 wrote to memory of 4300 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 94 PID 5068 wrote to memory of 4300 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 94 PID 5068 wrote to memory of 4300 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 94 PID 5068 wrote to memory of 2164 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 95 PID 5068 wrote to memory of 2164 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 95 PID 5068 wrote to memory of 2164 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 95 PID 5068 wrote to memory of 2164 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 95 PID 5068 wrote to memory of 2164 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 95 PID 5068 wrote to memory of 2164 5068 f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"2⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"2⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"2⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"C:\Users\Admin\AppData\Local\Temp\f1b36ca7d670bc735b032e07885bd7abf35b346cccb5196615e15adede30b5fa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-