Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 13:20
Static task
static1
Behavioral task
behavioral1
Sample
238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe
Resource
win7-20230703-en
General
-
Target
238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe
-
Size
238KB
-
MD5
8ec5b6656574a65d6f57b1f27decd161
-
SHA1
6cfb91be22a7c684e04cdc3e4e36f3c43c7e702f
-
SHA256
238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458
-
SHA512
b0848c25c587590b47349faef70e48f64995fbe566bcd55bf360181193bc04f5af5d18a1bfd85f01c7d3b01c6d69f11b4d2b8f21bd6fcaf5cbc82a2b5112f933
-
SSDEEP
6144:PYa6VVMUOy1kznVL5hQg0KLB2GkjRLL7w6rdv+:PYfmukbVLH70KMJjRbw6rdv+
Malware Config
Extracted
formbook
4.1
da23
jiuse896.com
htdingguanji.com
gbwnxhdxaudxi.com
stakoov.com
tuttu517.com
shubaerc.com
bytxon.xyz
9ihoa7.com
pacificpanacea.com
hubawatch.com
hei0obbq8sp9te.xyz
19xqe6.cfd
anagecre.com
fwradi.online
45188.icu
institutdelama.com
picateers.pro
ewmsty.site
yamaharigs.com
jistream.com
xunhezuo.com
gameconvector.cfd
kiptl.com
tourismfacility.com
33x8rgi0yb4.cyou
7723060.com
kanstingers.com
2uv8p.site
maomaos.top
duolex.app
4yuxwr.cfd
enlacepatrimonial.com
smd-edu.com
twofourstore.com
300k8conwmg.net
digitales.kids
ym3j.com
3rtbvj.site
ecosoul.live
ingehospica.com
discoverytheword.com
rzpzdz.com
tgbothook.store
individual.business
bddc-ltd.com
puffinzz.com
infodecoralweb.com
teachercarolz.com
calorimeterexpert.com
ordinaisbubbles.com
frontierdesignersshades.com
birfik.com
beachgrappling.com
margaritako.com
gidted.com
camperfireplace.com
immediatelyrepertoire.com
b257sh5.asia
villademasi.com
4213b8.com
lostsocietyattire.com
by691.vip
jpmijid.com
gumusglobal.com
avranox.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2992-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1380 set thread context of 2992 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2992 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2992 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe 29 PID 1380 wrote to memory of 2992 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe 29 PID 1380 wrote to memory of 2992 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe 29 PID 1380 wrote to memory of 2992 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe 29 PID 1380 wrote to memory of 2992 1380 238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe"C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe"C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD576c9bc90fe94ed2de99af273900404dc
SHA18e23684dbe55183c6916f1533ff1870c85d6fdeb
SHA2564e2bb7ba85a7232e9d9e1e0918e0e0a2f919a4e184fa18f61e312830070728ae
SHA5121acd615bb5948c27e52ecc855f9a7ec32d84f2d6411a8e036f4570d289fa9baf377d503fe81098172f074d70d1b852413261239b1ca03a04a8778c6867a95ae6