Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
SVD002837727.exe
Resource
win7-20230220-en
General
-
Target
SVD002837727.exe
-
Size
798KB
-
MD5
fdb52da6cf766fb4f0c56d3dac749faa
-
SHA1
32c1e7f2ac0506025ceafd8465fb5be2c61590bf
-
SHA256
6504563c0b530d8886ebe893983491e046949b70117d41c9baff7e8503e202dd
-
SHA512
a9aa3ad596173825499b88c3abf07ace7f407ffa90a0dce4c631ac3e8b0dd278f3a3be198a05726c0ca914474845efc249a6fb6482b11e4a03f89b67d10e4bd9
-
SSDEEP
12288:6ZyvbhaDnLMzIL2q+RTdOL8er5TXnrd2Bh5qj4lPucRd3nX88+c7vWbtNr9/2DIY:3OyqGUL8CTXSPuc7Xs7J/y2B/S
Malware Config
Extracted
formbook
4.1
km37
busybody.app
damcostafreda12.cat
blueridgebedracks.com
hilltopspice.com
addonysfitwear.com
bestridelabs.com
huashi366.com
1wihug.top
66563.se
96mvipmy.com
lab1207.com
80b80.app
graphicstudio53.com
xn--etherealsoires-mkb.com
bestrosetoy.com
discounthub.xyz
addmusthaveoppprofit.online
abovegame.biz
getv3apparel.com
designroom.app
apatriotspeaks.com
ayq6cn.shop
androidrehber.com
iratewonderhandstore.africa
chateaufinewines.com
fantiplumbing.com
furadventure.com
jogo.africa
dashfashion.store
family-doctor-54927.com
66y143.xyz
bokenco.com
lermansalesmarketing.com
mybunnylawn.com
innerlovefest.com
jiayi-x.com
azart-player.ru
motorsolutionswithmakro.co.uk
demonstrate-suppress.net
jaafil.com
coinnspoo.com
micdavevtuportal.africa
austmactrading.com
bxsh.cloud
ourfturehealth.org.uk
3dgamesource.com
capturecreativeproductions.com
vestby.net
uyruio.xyz
calandrainmanlaw.com
horsesnarrowboatsrabbits.com
moosemunch.boo
famousleaked.site
betonyventures.com
68i81.top
katskateringllc.com
wemakebelieve.africa
hissy.shop
eatit.click
awesomeessential.com
hbcumicbrophone.com
calliebarrows.online
brippa.store
chopsbyzarah.com
doordelivery.life
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/948-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/948-162-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1304-165-0x0000000000B90000-0x0000000000BBF000-memory.dmp formbook behavioral2/memory/1304-167-0x0000000000B90000-0x0000000000BBF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3304 set thread context of 948 3304 SVD002837727.exe 91 PID 948 set thread context of 3136 948 SVD002837727.exe 19 PID 1304 set thread context of 3136 1304 control.exe 19 -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 948 SVD002837727.exe 948 SVD002837727.exe 948 SVD002837727.exe 948 SVD002837727.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe 1304 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 948 SVD002837727.exe 948 SVD002837727.exe 948 SVD002837727.exe 1304 control.exe 1304 control.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 948 SVD002837727.exe Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeDebugPrivilege 1304 control.exe Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3304 wrote to memory of 948 3304 SVD002837727.exe 91 PID 3304 wrote to memory of 948 3304 SVD002837727.exe 91 PID 3304 wrote to memory of 948 3304 SVD002837727.exe 91 PID 3304 wrote to memory of 948 3304 SVD002837727.exe 91 PID 3304 wrote to memory of 948 3304 SVD002837727.exe 91 PID 3304 wrote to memory of 948 3304 SVD002837727.exe 91 PID 3136 wrote to memory of 1304 3136 Explorer.EXE 92 PID 3136 wrote to memory of 1304 3136 Explorer.EXE 92 PID 3136 wrote to memory of 1304 3136 Explorer.EXE 92 PID 1304 wrote to memory of 400 1304 control.exe 93 PID 1304 wrote to memory of 400 1304 control.exe 93 PID 1304 wrote to memory of 400 1304 control.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\SVD002837727.exe"C:\Users\Admin\AppData\Local\Temp\SVD002837727.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\SVD002837727.exe"C:\Users\Admin\AppData\Local\Temp\SVD002837727.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SVD002837727.exe"3⤵PID:400
-
-