Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
uzomazx.exe
Resource
win7-20230712-en
General
-
Target
uzomazx.exe
-
Size
1.0MB
-
MD5
c178cb400a5d151c4e59640ca55b604a
-
SHA1
2f335f8791e3effef43c8f3441d9573f70ea22e9
-
SHA256
903bfcbe2d85143ad723b47ed1edc96f5416fa3b584fe76e74d75e93ff4b2e64
-
SHA512
fcc86d5858403f0a93ce1bda799e88338ad758403c1c6124ac181d61725052e0e1bd99edf1beff341cb576d085b63d3b78966c56a8b79cdf56b8d60a28e28527
-
SSDEEP
24576:j1u6u4RbJDAzdUqYyDim6cF56gemFZiPZHWxEGPnqdOp:jV9RbJwdtim6cF5sR2xEGPnqdO
Malware Config
Extracted
formbook
4.1
ua69
uslanmayizz.com
rrucrowd.com
nerexy.online
guolang-clan.com
meteleabogados.com
sh-gottipati.com
themesmiui.com
anananlan.com
roghanala.com
yekitiba.com
echoskinco.com
btlpour.xyz
shoyo-samaa.com
fuzzywumpus.net
malerzeit.com
xiam.online
brandibraunalissa.com
cryptominis.pro
we-living.com
dc-invest.online
bai8snn.top
angel-barroso.com
findingxanadu.life
overlayapiprovider.com
daniellemarietromp.com
zhumengtv.com
sckhkj.xyz
shangpu55.com
kimbellmedia.com
arperkonline.com
latinjock.com
skyeye.top
27server.space
stanwoodhairsalon.com
jlgeospatial.com
dimetodozen.com
adneinter.com
tinylotsrus.com
cinziabellydance.com
dg-zu.com
ghsng.com
migrant.productions
ozelinciegitim.com
tyc88128.com
beachbabebraids.com
neomcontacts.com
hernandocountylocksmith.com
riellalayneco.com
anjipooh.com
kururia.fun
interviewapplication.net
whynotmellc.com
pinellasgov.com
duckdollars.com
bas-project.website
alws.top
dangdangfanli.com
verdemoosa.com
drlovebhatia.com
betpara258.com
fmbzaw.top
pasionxfutbol.com
webers.site
lorgp.com
tactica.studio
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1416-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1416-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4000-20-0x00000000009B0000-0x00000000009DF000-memory.dmp formbook behavioral2/memory/4000-22-0x00000000009B0000-0x00000000009DF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1852 set thread context of 1416 1852 uzomazx.exe 92 PID 1416 set thread context of 3108 1416 uzomazx.exe 66 PID 4000 set thread context of 3108 4000 wlanext.exe 66 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1416 uzomazx.exe 1416 uzomazx.exe 1416 uzomazx.exe 1416 uzomazx.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe 4000 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3108 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1416 uzomazx.exe 1416 uzomazx.exe 1416 uzomazx.exe 4000 wlanext.exe 4000 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1416 uzomazx.exe Token: SeDebugPrivilege 4000 wlanext.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1416 1852 uzomazx.exe 92 PID 1852 wrote to memory of 1416 1852 uzomazx.exe 92 PID 1852 wrote to memory of 1416 1852 uzomazx.exe 92 PID 1852 wrote to memory of 1416 1852 uzomazx.exe 92 PID 1852 wrote to memory of 1416 1852 uzomazx.exe 92 PID 1852 wrote to memory of 1416 1852 uzomazx.exe 92 PID 3108 wrote to memory of 4000 3108 Explorer.EXE 93 PID 3108 wrote to memory of 4000 3108 Explorer.EXE 93 PID 3108 wrote to memory of 4000 3108 Explorer.EXE 93 PID 4000 wrote to memory of 1428 4000 wlanext.exe 94 PID 4000 wrote to memory of 1428 4000 wlanext.exe 94 PID 4000 wrote to memory of 1428 4000 wlanext.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\uzomazx.exe"C:\Users\Admin\AppData\Local\Temp\uzomazx.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\uzomazx.exe"C:\Users\Admin\AppData\Local\Temp\uzomazx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\uzomazx.exe"3⤵PID:1428
-
-