Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
scan.tt-pdf/vgwR4TopGfezKSf.exe
Resource
win7-20230712-en
General
-
Target
scan.tt-pdf/vgwR4TopGfezKSf.exe
-
Size
587KB
-
MD5
28add1243c433986dbb73ef4e6763fa1
-
SHA1
eb5c172e07f5f8b7e30417ee8547a58b05996756
-
SHA256
73cb9c68b47d45884c4cbdb18d45a63a4d67a1f22ab8cb2a6ec92423cd77948d
-
SHA512
af35f5f3540b3110602222f917ea9fa76cf743573826d3e1a89472ed7623d88be97cd7c9f4c3d9c8b38d0ff7d2bed2c708809a1cda5de93990389e3bd6970542
-
SSDEEP
12288:3r4lrrr/zYPeL3bhmL8NnTl/EOnOzfAq3zStUunsB:3r4lXr/zieL3boQRlNn3q3ujns
Malware Config
Extracted
formbook
4.1
d6dt
curenveda.com
mavilitur.xyz
airdropfisher.com
jxwqeumw.click
solepowertool.com
quickmartltd.com
postbh.com
aerialcarried.click
teamabr-rfa.com
jeagma9k.click
aquaafiafoodsafety.com
dangtutu.com
lahfhg.com
patricia-lee.com
nextgencoders.tech
scercommerce.online
crates.surf
casamorganagelatos.com
dwynet.com
3genenterprisesllc.com
nvxyhax9.click
santosmexico.com
boughtbee.com
zhsoho.com
polanyx.com
pseudonym.info
vavadaqk.buzz
inofs.info
duakelinci.xyz
shareintw.top
bcpavkwv.click
88vin11.biz
noyou521.xyz
ychktrly.click
worldwidelogisticsco.com
enhancedmissionc.wiki
vtdstein95.xyz
igpcwqpl.click
krushitcafe.com
onefintech.net
friodisk.site
slotfortune228.info
ccbbj.com
voxmix.info
w7775.vip
theglobalexcelgroupexp.com
portaldotrabalho.net
staycloud.net
ugk35.com
zxzq5588.vip
bernardkuffler.com
dktmd.icu
cihhu.site
komitekeprsmfm.site
3621foxmore.com
mybusinessmagic.shop
algoraticsinfra.com
honehywell.com
xn--tftler-3ya.com
cafebluesky-fake.com
montrei.xyz
cjwdpouf.click
qfygmh.site
hdbfhgj.com
7qlt2lwnxzz7.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1440-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1440-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3276-152-0x0000000000F50000-0x0000000000F7F000-memory.dmp formbook behavioral2/memory/3276-154-0x0000000000F50000-0x0000000000F7F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4468 set thread context of 1440 4468 vgwR4TopGfezKSf.exe 91 PID 1440 set thread context of 3180 1440 vgwR4TopGfezKSf.exe 53 PID 3276 set thread context of 3180 3276 msdt.exe 53 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1440 vgwR4TopGfezKSf.exe 1440 vgwR4TopGfezKSf.exe 1440 vgwR4TopGfezKSf.exe 1440 vgwR4TopGfezKSf.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe 3276 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3180 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1440 vgwR4TopGfezKSf.exe 1440 vgwR4TopGfezKSf.exe 1440 vgwR4TopGfezKSf.exe 3276 msdt.exe 3276 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1440 vgwR4TopGfezKSf.exe Token: SeDebugPrivilege 3276 msdt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4468 wrote to memory of 1440 4468 vgwR4TopGfezKSf.exe 91 PID 4468 wrote to memory of 1440 4468 vgwR4TopGfezKSf.exe 91 PID 4468 wrote to memory of 1440 4468 vgwR4TopGfezKSf.exe 91 PID 4468 wrote to memory of 1440 4468 vgwR4TopGfezKSf.exe 91 PID 4468 wrote to memory of 1440 4468 vgwR4TopGfezKSf.exe 91 PID 4468 wrote to memory of 1440 4468 vgwR4TopGfezKSf.exe 91 PID 3180 wrote to memory of 3276 3180 Explorer.EXE 93 PID 3180 wrote to memory of 3276 3180 Explorer.EXE 93 PID 3180 wrote to memory of 3276 3180 Explorer.EXE 93 PID 3276 wrote to memory of 2796 3276 msdt.exe 94 PID 3276 wrote to memory of 2796 3276 msdt.exe 94 PID 3276 wrote to memory of 2796 3276 msdt.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\scan.tt-pdf\vgwR4TopGfezKSf.exe"C:\Users\Admin\AppData\Local\Temp\scan.tt-pdf\vgwR4TopGfezKSf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\scan.tt-pdf\vgwR4TopGfezKSf.exe"C:\Users\Admin\AppData\Local\Temp\scan.tt-pdf\vgwR4TopGfezKSf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3500
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\scan.tt-pdf\vgwR4TopGfezKSf.exe"3⤵PID:2796
-
-