Analysis
-
max time kernel
51s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2023 10:30
Static task
static1
Behavioral task
behavioral1
Sample
841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe
Resource
win7-20230220-en
General
-
Target
841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe
-
Size
816KB
-
MD5
f9df3670e25d3846200606958b47c4e5
-
SHA1
1177bfdae58c9f07f1bfc4d873a02562423c20d8
-
SHA256
841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410
-
SHA512
9895e4d8bf6649838aefe23fa904d70256dac09003d4b18b1a5bda7c61896c30982828077e349810d88492ae6eacb3721ff3a82fc83975f6d8c4599c459bb6d4
-
SSDEEP
12288:1S8hue/3H1OdvmnHKpBnM8NU1TwBiW7okCT66tk0riptH+VO8kevckNx:1BOdv8KpS8dBX7o7Fctekk
Malware Config
Extracted
formbook
4.1
ga36
700kitchen.com
udda.app
fractionalgc.tech
tipmercados.net
2-upapparel.net
directbookdiscount.com
koewetzeltours.com
d7c8-iuxt.com
hamaancook.com
benjaimnmoore.com
yimaglobal.africa
dispovapo.com
aseguvenlik.com
battery-worth.com
dddanbao.mobi
blueskyauberge.com
740.mobi
betterbonella.com
liverally.club
czubao.com
elliotthead.com
borkr.one
drvnsat.net
coldwellbankersolar.com
cityofexpertise.co.uk
independentdentist.network
bladesofbeautybymichelle.com
gqf5y.com
astergab.com
eventinvite.rsvp
indyfurnitureguild.com
theunrelentingbrush.co.uk
concealedcarry.info
a-alphaxtraboost.com
21diasdegratitud.com
edlevostatus.se
hradvocaciacriminal.com
efefindustrious.buzz
arafat.xyz
jlhaoniu.com
citizensbank.top
eatzpizzeria.com
everestfunerak.com
thecovenscorner.co.uk
subskrebcstumer.com
calabatherapy.com
braces-cost-affordable.com
erinandjacob.com
hakkaqq.website
flymavis.com
9774.top
hcthi.com
ecommercecolcorp.com
blackbluejetfriday.com
fralu.tech
biohackinghealthspan.com
cumhuriyet.click
dynamicbingo.live
jonashaapp.store
intentionallivingsoul.com
careerguru.academy
mexob.online
calaaccessories.com
kolagaems.com
310003.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/588-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 916 set thread context of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 588 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 916 wrote to memory of 564 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 27 PID 916 wrote to memory of 564 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 27 PID 916 wrote to memory of 564 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 27 PID 916 wrote to memory of 564 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 27 PID 916 wrote to memory of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28 PID 916 wrote to memory of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28 PID 916 wrote to memory of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28 PID 916 wrote to memory of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28 PID 916 wrote to memory of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28 PID 916 wrote to memory of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28 PID 916 wrote to memory of 588 916 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"2⤵PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:588
-