Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
d2f580c133802c6a3d4117117d5c16cc.exe
Resource
win7-20230712-en
General
-
Target
d2f580c133802c6a3d4117117d5c16cc.exe
-
Size
590KB
-
MD5
d2f580c133802c6a3d4117117d5c16cc
-
SHA1
eb014e24331bd1df38875d5c722e0db16dc8d5db
-
SHA256
cfd843a4218fd91e46bf20068627e94bcc20cf68ec6a84ad4811d39b8c6c7ccd
-
SHA512
4d8caad78cf422dc6c29db278c16076a7a8697e5f60c238cccc1ac7e5dbea6bf444b70baf227c3596ba7f7de89d2368d42ce1991dc9071b686affe0833f7c48c
-
SSDEEP
12288:PPwJpDRWJ373SENQZ6DRRu1Lc6jRhjszcNrI5GPcn:Xw03bSWQEDDvGjBi5i
Malware Config
Extracted
formbook
4.1
4hc5
amandaastburyillustration.com
7141999.com
showshoe.info
sagemarlin.com
lithuaniandreamtime.com
therenixgroupllc.com
avalialooks.shop
vurporn.com
lemmy.systems
2816goldfinch.com
pacersun.com
checktrace.com
loadtransfer.site
matsuri-jujutsukaisen.com
iontrapper.science
5108010.com
beidixi.com
21305599.com
peakvitality.fitness
osisfeelingfee.com
hotshark-shop.com
bollywood.nexus
stephenplattassociatesllp.com
bakepreneurs.com
claudiobarros.online
akabou-hayasaka.com
collibrishop.online
britishfemalevo.com
prestigesmp.online
wzmatics.com
sactribune.com
slotjitu88.website
theproactiveexpat.com
therealnikib.com
elnoh.life
tianyan110.com
tcbbuilds.com
zhe276.com
c1405.com
candicrem.com
lambdasigmarho.com
gemwhk.store
crissmendez.com
locduongseafood.com
jessformdsenate.info
329.bio
nbgonghe.com
tr-ij.com
quailrun-inc.com
pathlightpropertiesmgt.com
lpqxmz.site
castlegrouplt.com
beautybylily.com
bernabeicarniceriaygranja.com
spicax.com
globalentertainmentservices.com
modluxenwa.com
imaswe.com
hntv6201.top
homerevamps.today
motionmixmedia.com
antojitoslosramos.com
julieslive.com
bepnuclasechia.com
iqixuehe.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1812-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3844 set thread context of 1812 3844 d2f580c133802c6a3d4117117d5c16cc.exe 95 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3844 d2f580c133802c6a3d4117117d5c16cc.exe 3844 d2f580c133802c6a3d4117117d5c16cc.exe 1812 d2f580c133802c6a3d4117117d5c16cc.exe 1812 d2f580c133802c6a3d4117117d5c16cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3844 d2f580c133802c6a3d4117117d5c16cc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3844 wrote to memory of 4976 3844 d2f580c133802c6a3d4117117d5c16cc.exe 94 PID 3844 wrote to memory of 4976 3844 d2f580c133802c6a3d4117117d5c16cc.exe 94 PID 3844 wrote to memory of 4976 3844 d2f580c133802c6a3d4117117d5c16cc.exe 94 PID 3844 wrote to memory of 1812 3844 d2f580c133802c6a3d4117117d5c16cc.exe 95 PID 3844 wrote to memory of 1812 3844 d2f580c133802c6a3d4117117d5c16cc.exe 95 PID 3844 wrote to memory of 1812 3844 d2f580c133802c6a3d4117117d5c16cc.exe 95 PID 3844 wrote to memory of 1812 3844 d2f580c133802c6a3d4117117d5c16cc.exe 95 PID 3844 wrote to memory of 1812 3844 d2f580c133802c6a3d4117117d5c16cc.exe 95 PID 3844 wrote to memory of 1812 3844 d2f580c133802c6a3d4117117d5c16cc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2f580c133802c6a3d4117117d5c16cc.exe"C:\Users\Admin\AppData\Local\Temp\d2f580c133802c6a3d4117117d5c16cc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\d2f580c133802c6a3d4117117d5c16cc.exe"C:\Users\Admin\AppData\Local\Temp\d2f580c133802c6a3d4117117d5c16cc.exe"2⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\d2f580c133802c6a3d4117117d5c16cc.exe"C:\Users\Admin\AppData\Local\Temp\d2f580c133802c6a3d4117117d5c16cc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-