Analysis
-
max time kernel
39s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
12/07/2023, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
a53ce90f8e820d5e4684735fc005b88a.exe
Resource
win7-20230703-en
General
-
Target
a53ce90f8e820d5e4684735fc005b88a.exe
-
Size
665KB
-
MD5
a53ce90f8e820d5e4684735fc005b88a
-
SHA1
8be02cb798e731ab23b05f14cfc99ce632294423
-
SHA256
0678008b99744da75d64b17e189a5f8934780a0ddf2384d8c24e4240f796dc34
-
SHA512
95bfa247271621a5b13630f51321715702508158eaea844715ab6e9b0f97438090aaf278f9ba69fe56b7137cc441b02c8595a45615a3a017f1ca0d8ffc6c88c2
-
SSDEEP
12288:pN1C8HeuvIEkbB95s/yhn6Vv0g1Ma3hxG/9yG4OK23PR:8eIES5sK5Wd7bG/9YnI
Malware Config
Extracted
formbook
4.1
ge83
zqgf529.com
ohrana-truda-truda-rf.online
alyasra-sa.com
luxurynev.com
glassfactorycaribe.com
computechitsolutions.info
chillbeathk.com
fxphones.com
glamvoyager.com
empresaspiana.com
doraemon.center
jobstora.xyz
clicasaqui.com
shopchanticleers.com
xrworldnft.xyz
xrtrump.com
nirapottabd.com
azino777-600.buzz
2223malcolm.com
darunfayxaklf.vip
zxsh8.top
redi.press
architctana.com
freshnessperfume.com
makedr.ink
yourserviceninjas.com
yourscaleupcoo.com
friendsofthearch.com
supachui.xyz
anagramcloud.com
04ax.top
12372123.com
hanhoequine.online
mzflyzone.com
runwithstan.com
1588cmcc.com
7581055.com
amymturnbull.xyz
luxgoddess.online
honorun.com
jaterix.net
909abc777.com
welat-teach.com
cayecastagnetto.net
sxrtv.top
144hs.com
muamuagi.click
todayslotto.store
9bartv.net
folkos.com
thepresaleplug.com
755xii.net
asterandleo.com
olliex.com
cryptohustling.com
tommybcarpentry.com
greengrass.info
bannedtee.com
elegantmakeovers.com
synguyen.xyz
saireddy.info
anchordp.com
madeinlodiwi.com
oasisfeed.mom
minor138.xyz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2408-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 powershell.exe 2408 a53ce90f8e820d5e4684735fc005b88a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2288 1824 a53ce90f8e820d5e4684735fc005b88a.exe 28 PID 1824 wrote to memory of 2288 1824 a53ce90f8e820d5e4684735fc005b88a.exe 28 PID 1824 wrote to memory of 2288 1824 a53ce90f8e820d5e4684735fc005b88a.exe 28 PID 1824 wrote to memory of 2288 1824 a53ce90f8e820d5e4684735fc005b88a.exe 28 PID 1824 wrote to memory of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30 PID 1824 wrote to memory of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30 PID 1824 wrote to memory of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30 PID 1824 wrote to memory of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30 PID 1824 wrote to memory of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30 PID 1824 wrote to memory of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30 PID 1824 wrote to memory of 2408 1824 a53ce90f8e820d5e4684735fc005b88a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a53ce90f8e820d5e4684735fc005b88a.exe"C:\Users\Admin\AppData\Local\Temp\a53ce90f8e820d5e4684735fc005b88a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a53ce90f8e820d5e4684735fc005b88a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\a53ce90f8e820d5e4684735fc005b88a.exe"C:\Users\Admin\AppData\Local\Temp\a53ce90f8e820d5e4684735fc005b88a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-