Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08/08/2023, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
General
-
Target
tmp.exe
-
Size
748KB
-
MD5
b5027bab17fb5aa21f00bf3ba4528661
-
SHA1
b355cce034c4c385e7ee27c979a7e10877e3543b
-
SHA256
e4b8b19c8c8fd39ae06ba2ec632970e7fe16f78ca1f91582461de5da1403a4ed
-
SHA512
f5bf202f0d4d85278d0fb68489cb5f9e322637d59cb29aa513151507a8131b92f1cc7237c1e134efdf165f1edf267dbd1fd5508afa3f97b83e7b85c0e9bb26b7
-
SSDEEP
12288:LsokiF9BChPxxI4VTzCHp8z2ko1bnSSGM8WMupmLwiAdT6/F:QokiZChP8Uzwp8z2BF/AWAwdT6/
Malware Config
Extracted
formbook
4.1
oy30
rfc234.top
danielcavalari.com
elperegrinocabo.com
aryor.info
surelistening.com
premium-numero-telf.buzz
orlynyml.click
tennislovers-ro.com
holdmytracker.com
eewapay.com
jaimesinstallglass.com
damactrade.net
swapspecialities.com
perfumesrffd.today
salesfactory.pro
supportive-solutions.com
naiol.com
khoyr.com
kalendeargpt44.com
web-tech-spb.store
lodjireal.online
ultraflooringmore.com
iwantbundles.com
theroofer.lat
qwxry.fun
faserfreunde.com
body-for-living.com
welnessfit.com
clublucky.store
nlast.cyou
gkoders.com
okxmttwa.click
nodesofty.com
alemania-paredes.com
travel-insuranceprice.shop
thechaay.com
formulavsupplements.com
gstringtheory.com
ruopenai.com
evi-based.com
danleugers.com
lojinhaevelyn.com
denzaimivsem.buzz
izmn2vd8.click
asliy.top
kawitrack.com
brandiai.com
ssssne.com
asianewsgood.online
proloop.work
dhikaedwina.com
onemarinallc.com
realmpabq.com
boswells.biz
jpxiaoxi.top
ishirink.com
thundershorts.com
rainydayroofs.com
atatra.com
hftroi.xyz
fundamentplus.com
gsvaedpzugtdn.com
mic-reform.info
vacuumbagsuppliers.com
gaoxiba150.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2976-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2976-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2976-75-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2696-83-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook behavioral1/memory/2696-85-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2668 set thread context of 2976 2668 tmp.exe 30 PID 2976 set thread context of 1292 2976 tmp.exe 21 PID 2976 set thread context of 1292 2976 tmp.exe 21 PID 2696 set thread context of 1292 2696 msiexec.exe 21 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2976 tmp.exe 2976 tmp.exe 2976 tmp.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe 2696 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1292 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2976 tmp.exe 2976 tmp.exe 2976 tmp.exe 2976 tmp.exe 2696 msiexec.exe 2696 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2976 tmp.exe Token: SeDebugPrivilege 2696 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2976 2668 tmp.exe 30 PID 2668 wrote to memory of 2976 2668 tmp.exe 30 PID 2668 wrote to memory of 2976 2668 tmp.exe 30 PID 2668 wrote to memory of 2976 2668 tmp.exe 30 PID 2668 wrote to memory of 2976 2668 tmp.exe 30 PID 2668 wrote to memory of 2976 2668 tmp.exe 30 PID 2668 wrote to memory of 2976 2668 tmp.exe 30 PID 1292 wrote to memory of 2696 1292 Explorer.EXE 31 PID 1292 wrote to memory of 2696 1292 Explorer.EXE 31 PID 1292 wrote to memory of 2696 1292 Explorer.EXE 31 PID 1292 wrote to memory of 2696 1292 Explorer.EXE 31 PID 1292 wrote to memory of 2696 1292 Explorer.EXE 31 PID 1292 wrote to memory of 2696 1292 Explorer.EXE 31 PID 1292 wrote to memory of 2696 1292 Explorer.EXE 31 PID 2696 wrote to memory of 2640 2696 msiexec.exe 32 PID 2696 wrote to memory of 2640 2696 msiexec.exe 32 PID 2696 wrote to memory of 2640 2696 msiexec.exe 32 PID 2696 wrote to memory of 2640 2696 msiexec.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Deletes itself
PID:2640
-
-