Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2023 06:19
Static task
static1
Behavioral task
behavioral1
Sample
obizx.exe
Resource
win7-20230712-en
General
-
Target
obizx.exe
-
Size
605KB
-
MD5
745174884165278ca284212180544a17
-
SHA1
920d5344b51f4f97cd92230e85c339c2237aaf1f
-
SHA256
2e43e75303476b0eff6585680ad006cc7a7506a4564aa49504512ee3b6621884
-
SHA512
b27d88282d10f6ecb0de600c4800e8b07f97a7348f47ee996cd205a1a84e5beafdbe4c6f4e589aceb56261c85c0dc95108c3fdb88cfcbc1077daadde7bca0d80
-
SSDEEP
12288:mg7JYihlZ/dMkbGo4suHNmS3cgexJAY7ytxcFmRCkn8RWpaxOXskry:mg7CClxek9huHNi1JAY72xr4kqW8xOXB
Malware Config
Extracted
formbook
4.1
oy30
rfc234.top
danielcavalari.com
elperegrinocabo.com
aryor.info
surelistening.com
premium-numero-telf.buzz
orlynyml.click
tennislovers-ro.com
holdmytracker.com
eewapay.com
jaimesinstallglass.com
damactrade.net
swapspecialities.com
perfumesrffd.today
salesfactory.pro
supportive-solutions.com
naiol.com
khoyr.com
kalendeargpt44.com
web-tech-spb.store
lodjireal.online
ultraflooringmore.com
iwantbundles.com
theroofer.lat
qwxry.fun
faserfreunde.com
body-for-living.com
welnessfit.com
clublucky.store
nlast.cyou
gkoders.com
okxmttwa.click
nodesofty.com
alemania-paredes.com
travel-insuranceprice.shop
thechaay.com
formulavsupplements.com
gstringtheory.com
ruopenai.com
evi-based.com
danleugers.com
lojinhaevelyn.com
denzaimivsem.buzz
izmn2vd8.click
asliy.top
kawitrack.com
brandiai.com
ssssne.com
asianewsgood.online
proloop.work
dhikaedwina.com
onemarinallc.com
realmpabq.com
boswells.biz
jpxiaoxi.top
ishirink.com
thundershorts.com
rainydayroofs.com
atatra.com
hftroi.xyz
fundamentplus.com
gsvaedpzugtdn.com
mic-reform.info
vacuumbagsuppliers.com
gaoxiba150.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3596-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3596-149-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3944-155-0x0000000000720000-0x000000000074F000-memory.dmp formbook behavioral2/memory/3944-157-0x0000000000720000-0x000000000074F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2024 set thread context of 3596 2024 obizx.exe 94 PID 3596 set thread context of 3136 3596 obizx.exe 40 PID 3944 set thread context of 3136 3944 svchost.exe 40 -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3596 obizx.exe 3596 obizx.exe 3596 obizx.exe 3596 obizx.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe 3944 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3596 obizx.exe 3596 obizx.exe 3596 obizx.exe 3944 svchost.exe 3944 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3596 obizx.exe Token: SeDebugPrivilege 3944 svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3596 2024 obizx.exe 94 PID 2024 wrote to memory of 3596 2024 obizx.exe 94 PID 2024 wrote to memory of 3596 2024 obizx.exe 94 PID 2024 wrote to memory of 3596 2024 obizx.exe 94 PID 2024 wrote to memory of 3596 2024 obizx.exe 94 PID 2024 wrote to memory of 3596 2024 obizx.exe 94 PID 3136 wrote to memory of 3944 3136 Explorer.EXE 95 PID 3136 wrote to memory of 3944 3136 Explorer.EXE 95 PID 3136 wrote to memory of 3944 3136 Explorer.EXE 95 PID 3944 wrote to memory of 3336 3944 svchost.exe 96 PID 3944 wrote to memory of 3336 3944 svchost.exe 96 PID 3944 wrote to memory of 3336 3944 svchost.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\obizx.exe"C:\Users\Admin\AppData\Local\Temp\obizx.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\obizx.exe"C:\Users\Admin\AppData\Local\Temp\obizx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\obizx.exe"3⤵PID:3336
-
-