Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2023 07:57
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.PDF.exe
Resource
win7-20230220-en
General
-
Target
hesaphareketi-01.PDF.exe
-
Size
739KB
-
MD5
e9d423ad70831fee10afa1a3a58da8c0
-
SHA1
305c942109bb57a34791689d76fc2e013cd96d41
-
SHA256
ea370765d72286adf1310958539f8caed1eeab11b23644b4f0672840e3c937af
-
SHA512
17a18bd014479bd2c20ed891fb4c719038416e18a1b61e13717b89f739914213893e9b1e36e00e52e6aee420325bfe0f76f01af4496704024bcb069fe99c9315
-
SSDEEP
12288:9rHkmFx2iqNhujGjUR9HCxnbD0gaJ5oAmk7WKR5njrK8MHJMtrDaOfqx:tEmFxU8Cxnf0gq5OgWKrvzNtrDx
Malware Config
Extracted
formbook
4.1
a2e2
emptylegtrip.com
figge.shop
euro-easy-capital.com
coinsbaseotc.com
midnight-iohk.net
cweas.online
pennymanning.net
shiehkids.net
undawear.africa
aheartfelttouch.com
attorneycaraccidents.net
colourkodedllc.com
love2lovebeautifulpleasures.com
loan-fha-now.com
mdc-shop.net
chooselifeministriescenter.com
oliverhodkinson.co.uk
data-link.site
foxton.store
dongtay.group
benjaminlucas.site
eldamarsanxenxo.com
b0onsupply.com
smartmlspropkit.net
11c.tokyo
meldrumsceres.co.uk
vavic.net
naijajacks.africa
inkwellfinance.com
eddiebeachshack.com
jpstonemartinc.com
honghuo1457.top
eklof.email
felizhouse-okna.ru
yoursolared.com
electriciannewbedfordma.com
calisrootjuice.com
ev-rum.com
hashtag-radio.net
hustleinc.net
jidobrothers.africa
geekyai.com
fightexplorer.com
ccclabs.net
originallyusaka.com
chrisyeo.click
bartkroconsulting.com
bozartart.club
hvacplusllc.com
displayelectricalservices.com
asaldl.xyz
daisywolf.top
arrayholidaytravels.com
visionscreeners.africa
ebenezerbandeira.com
saintbaptistellp.co.uk
amazingvictoria.shop
clkfoot.com
lovlex.com
b21385aa.com
bikenbells.com
livepureandhealthy.africa
whynotapp.net
btmovi.love
somersetcorp.co.uk
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1636-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1636-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4576-149-0x00000000010D0000-0x00000000010FF000-memory.dmp formbook behavioral2/memory/4576-151-0x00000000010D0000-0x00000000010FF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1508 set thread context of 1636 1508 hesaphareketi-01.PDF.exe 90 PID 1636 set thread context of 3136 1636 hesaphareketi-01.PDF.exe 45 PID 4576 set thread context of 3136 4576 colorcpl.exe 45 -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 1508 hesaphareketi-01.PDF.exe 1508 hesaphareketi-01.PDF.exe 1508 hesaphareketi-01.PDF.exe 1508 hesaphareketi-01.PDF.exe 1508 hesaphareketi-01.PDF.exe 1508 hesaphareketi-01.PDF.exe 1508 hesaphareketi-01.PDF.exe 1636 hesaphareketi-01.PDF.exe 1636 hesaphareketi-01.PDF.exe 1636 hesaphareketi-01.PDF.exe 1636 hesaphareketi-01.PDF.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe 4576 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1636 hesaphareketi-01.PDF.exe 1636 hesaphareketi-01.PDF.exe 1636 hesaphareketi-01.PDF.exe 4576 colorcpl.exe 4576 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1508 hesaphareketi-01.PDF.exe Token: SeDebugPrivilege 1636 hesaphareketi-01.PDF.exe Token: SeDebugPrivilege 4576 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1636 1508 hesaphareketi-01.PDF.exe 90 PID 1508 wrote to memory of 1636 1508 hesaphareketi-01.PDF.exe 90 PID 1508 wrote to memory of 1636 1508 hesaphareketi-01.PDF.exe 90 PID 1508 wrote to memory of 1636 1508 hesaphareketi-01.PDF.exe 90 PID 1508 wrote to memory of 1636 1508 hesaphareketi-01.PDF.exe 90 PID 1508 wrote to memory of 1636 1508 hesaphareketi-01.PDF.exe 90 PID 3136 wrote to memory of 4576 3136 Explorer.EXE 91 PID 3136 wrote to memory of 4576 3136 Explorer.EXE 91 PID 3136 wrote to memory of 4576 3136 Explorer.EXE 91 PID 4576 wrote to memory of 4164 4576 colorcpl.exe 92 PID 4576 wrote to memory of 4164 4576 colorcpl.exe 92 PID 4576 wrote to memory of 4164 4576 colorcpl.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.PDF.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.PDF.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.PDF.exe"3⤵PID:4164
-
-