Analysis
-
max time kernel
123s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 02:14
Static task
static1
Behavioral task
behavioral1
Sample
afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe
Resource
win7-20230712-en
General
-
Target
afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe
-
Size
463KB
-
MD5
c36113ac380951204651c549f3eab824
-
SHA1
80cbd1c320ffb13cdc6139ff66ea28e2fb38e4e1
-
SHA256
afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9
-
SHA512
9124fafcf82946ff1b2273601099c9a3b0db0bc9be55e488fb1ca9420af5a1be5935e4ca24cb6347c7baa69235aaa0410264107a1121c7c6b6b6f121180abe45
-
SSDEEP
12288:XYAEUfI55HxlJQ57Wl3ZmwZgE+YY0jV86:XYApkVQ5iJmwZg/0jV86
Malware Config
Extracted
formbook
4.1
s27k
barbecue-electrique.info
leaffonly.com
h-two-vision.com
milodongym.com
speakerboxstudios.com
s61wes7t5ak1.xyz
truthistanbul.xyz
noahmarean.com
innova-strategic.com
recetasfaciles.online
williamsburgpartners.com
rdrfa.icu
happyhedgehogpress.com
zielhomefurnishing.store
jscd66.com
totallyvaultworthy.com
hexagongroupusa.com
a990h5ipg0.top
arkamailers.com
eqpmjdcw.click
flippinyourbusiness.com
what-the-foto.com
ouryellowumbrella.com
greenbets.pro
popredlozheniyam.motorcycles
falistik.company
sy-1.top
petesguysgarage.com
geeksquadusa.info
renda-extra.click
boltwhippetunleashed.com
tradingviey.com
experiencia-s12s30.com
iunk.link
farmaciapiquer.com
rocnationstudios.info
maihiendidonghoaphat.com
bbetn.com
bulconsports.com
jiuopsa.xyz
nfkxtuha.click
unlimited-code.pro
jzyoaary.click
drgwfzpd.click
oaljuhani.com
rubywoodproducts.com
notio-apps.online
dkcnd.cyou
supashoppa.com
koooly.com
convertgen.com
amitravel.info
dryeyetreatmentgrfdds.today
innday.info
peoplepersonals.com
foreverenamored.com
welqeustliving.com
chlrlotte.com
livinallard.com
yakmediaagency.xyz
tetoteokinawa.com
dsemoalrf.com
blkfence.com
pineappleloft.com
lizardsullen.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/220-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 4576 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4576 set thread context of 220 4576 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 220 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe 220 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4576 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4576 wrote to memory of 220 4576 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe 83 PID 4576 wrote to memory of 220 4576 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe 83 PID 4576 wrote to memory of 220 4576 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe 83 PID 4576 wrote to memory of 220 4576 afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe"C:\Users\Admin\AppData\Local\Temp\afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe"C:\Users\Admin\AppData\Local\Temp\afff63cf4baca4e2a5f58803754843aca7c75437c0cd7b0cb6b60efb72692fc9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD576e2a4943339762fcd836ce964a8b297
SHA189c8b057f910076230aa4258a8ff464a259c599c
SHA256eaea5b76bd62817395e8fba17d7c7ffb02061f32561862d50cbc454bc2547562
SHA5129ff283886a2e34b5d9028eba4ea59ef39f46d725bb96ba1fa1169180f3d270d369b5124f3984225e4a4ee27a693ae2b2f40b1a335d5cf6a8b116ddc92cf4dd85