Analysis
-
max time kernel
118s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/06/2023, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe
Resource
win10v2004-20230220-en
General
-
Target
a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe
-
Size
803KB
-
MD5
4c9d490c41c872311332c0cbc2a999e5
-
SHA1
8e5e136ccb4865f6c66fb596b0fb10338e77d04b
-
SHA256
a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba
-
SHA512
c960f2c3101c50e30a270ff4e18a96cef9e2b31f5c75f327a1873d97a85c8937965092229b4aad96bbb3ef53b07af7a82a9fa194d35ca3f6551921586310e71e
-
SSDEEP
24576:dhrWy28X0DhRPKGmZaSfIjWwCyHdgtVjBv0I+:nWy2Y01NKG0aE+CyGvjBv
Malware Config
Extracted
formbook
4.1
s90a
0vgf22.shop
eyewearstories.com
hotvibes.africa
cgseon.com
ibx-keys.com
3ruuefka.com
bliss-blissful.com
ccwt.vip
dswb2b.com
globaltigerventure.com
akinbenjamin.africa
healingforbodyandsoul.com
bermudadunesmovers.com
iconiclondontours.com
houseofbeauti.com
aaghneyafoodsproducts.com
bewertungsanwalt.com
74567.site
cabinet-mak.com
midnighthelp.net
itsya1sz.com
leoheart.africa
hgcdata.com
childcareworkerjobssearch.life
12463.se
graficapogo.com
digitalmarketingcourse-es.life
hackerverse.social
elozowe.xyz
barnesmexc.com
huamaoks.com
ascendedcollab.com
houseofclaniel.africa
ipntwj.info
aisa8w.com
paychair.com
awhale.xyz
klevinx.com
eseniya-mag.ru
atelier-tsubame.com
332degrees.com
allmyrealestateneeds.info
epicmoviecostumes.com
kbo123fnlk1sfj264fjalfj.xyz
ifyanything.com
pontefractcongregational.org.uk
lftescahkw.click
clip2vip.club
kfzj120.com
crypto-pool.online
hertzcardeal.com
jwpfinancial.com
colopfiku.store
helpertrack.com
coussins-de-grossesse.com
ahaprocessprofessional.net
firmen-heim.com
yumyumcafe.net
auctionssales.com
amanhasempre.com
fastartcustom.com
gqqwdz.com
gainanaestheticsuccess.com
kingstube.africa
349232.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1304-73-0x000000001A860000-0x000000001A88F000-memory.dmp formbook behavioral1/memory/1304-74-0x000000001B440000-0x000000001B4C0000-memory.dmp formbook -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe 1932 powershell.exe 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe Token: SeDebugPrivilege 1932 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1932 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe 27 PID 1304 wrote to memory of 1932 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe 27 PID 1304 wrote to memory of 1932 1304 a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe"C:\Users\Admin\AppData\Local\Temp\a1f8e5efca3676dae1b403d30644419c8a737028327a97f0adcbb09d18cc21ba.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-