Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe
Resource
win7-20230703-en
General
-
Target
b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe
-
Size
800KB
-
MD5
ec39b68632b1c21cce891735808e5bad
-
SHA1
367eb9ce7776adb301bdd27f51ac632e10184482
-
SHA256
b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a
-
SHA512
9bce138a8be3c9272c883e230eedbee66b8070c34ebe1c8c6dfe1bea1813fcd28800a95720fee10910a64eaa25b0b2b3cf24502b73ef4f88cd5e22aefa69794e
-
SSDEEP
12288:ioAcuF6mn1DHLZnvJ15iOe42KMu/N3mWhQmwmJCMpU+ZPjyzggl9SoUNUEkN/m8V:giOV/NOa7Pjysg2pYTY9ozxwU8EJBKM
Malware Config
Extracted
formbook
4.1
ct45
aeepi.com
lifestyledoneright.com
dilojakac.cfd
vievnsfabula.xyz
jiggirirecords.com
sklaap.xyz
prepper.day
tahta4d-vip.info
p94d3.xyz
17819.vip
gptvoucher.com
ig2x0m.com
croppdtt.com
hnnhiuqme6e701.xyz
zeis.xyz
w77773.com
inspantringa.cfd
webnative.xyz
haahhuzns1okd1.xyz
thinkingmansguidetowomen.com
w-coding-bootcamp-9131.online
ikano-dashboard.com
celikhazne.shop
admiringcoaching.com
elzanatyautoparts.com
e12123t14.xyz
weifengjuyuan.com
canallamar.online
623852.xn--mk1bu44c
techroble.com
yhs7.com
auctionufaslots.com
islamaswaja.com
etykewpe.cfd
vwamio.xyz
financejon.tech
06gp.icu
bn-todaybsvurumayisayi.net
michiganbricktemp.com
ziviupadnu.cfd
92227y9.com
getmagesty.com
prodmanoaudio.com
livy663.xyz
theinvoicing.com
banadacigkofte.online
thienanhotel-hue.com
zfxny117.com
mindsurfservers.com
osnovaforall.com
visizzle.com
vegiwa.online
nasaelephantplant.space
porastodzywa.xyz
compratecno.com
parkcitycollege.com
griesszetels.cfd
worthymutate.xyz
asimpledate.monster
ranthamborechambalsafari.com
hoorayworld.com
edmarkar.com
escoladabelezaonline.site
zb3j3dfz.cyou
toddlerworldacademy.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/64-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 64 2688 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 64 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 64 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2688 wrote to memory of 64 2688 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 96 PID 2688 wrote to memory of 64 2688 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 96 PID 2688 wrote to memory of 64 2688 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 96 PID 2688 wrote to memory of 64 2688 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 96 PID 2688 wrote to memory of 64 2688 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 96 PID 2688 wrote to memory of 64 2688 b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe"C:\Users\Admin\AppData\Local\Temp\b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe"C:\Users\Admin\AppData\Local\Temp\b1d6939bbb4a9f66306d13bd4b0cd7a59fbe69c451c3bd2df836a65c1114f70a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-