Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
30-08-2023 01:50
Static task
static1
Behavioral task
behavioral1
Sample
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe
Resource
win7-20230712-en
General
-
Target
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe
-
Size
554KB
-
MD5
7247c2f218df48a7bd824f33f86b1760
-
SHA1
675a63f975c572ce3c761688a8224e80bce90cd0
-
SHA256
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c
-
SHA512
4051997473e621298980c0a0e44548f3bd648c70ac79afb10e96ea995570f3754a600aec823abab285dd370b033f8913642316f0c87e7d97b210ee30582ea372
-
SSDEEP
12288:8ud04ufv0zINbr57FQ6gUNYitOrlrFpIrlO+A:Rd+f3BQ6gUGVlrgr
Malware Config
Extracted
formbook
4.1
gg62
refrigerators-pk.today
jajifi.fun
fivonworld.com
rangbangs.com
server-dell.com
jefevirtual.com
jobode.info
grindhardgarage.com
gaoxiba168.com
thekotturfund.com
taberla.com
santorinieshop.com
ajptqqex.click
johnjaen.com
innovantdev.com
mjofvsea2.com
yun0796.com
rokovoko.nexus
tuabogado.gratis
jqinnovation.online
ciayo103.click
duyguyildiz.com
amchemda.com
saleproductsp.cyou
scenestealersnyc.com
zeetaplasttech.com
gdiamonddesigns.com
theblackmanofwatsap.com
hcw5858.com
oxsvabil.click
locomotiveframeinspections.com
hpkpbqdj.click
laughhub.net
seedtutoring.com
buydomain.info
tomyhammer.com
vxometry.com
honghuomart.top
solsimst.com
rajdeep.digital
capybaraerc.live
talmeshak.com
tayloryourdata.com
aspd.info
ki70dr.xyz
ketolockegypt.com
allsystemselectricians.com
besorcio.store
babeandbeauties.com
fitstylepro.com
openbinders.com
jiipwheels.net
businessed.xyz
mexpbe.xyz
hartyandsmith.com
implantedentalprecios.today
mynt.email
logisticswarehousinghub.com
dollhousesecrets.com
pt007.vip
tundeogunnusiandco.com
iavg.store
lingbdnv.click
jiangyuze.link
schinfler.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2688-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2688-15-0x00000000009E0000-0x0000000000CE3000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exedescription pid process target process PID 2348 set thread context of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exepid process 2688 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exedescription pid process target process PID 2348 wrote to memory of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe PID 2348 wrote to memory of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe PID 2348 wrote to memory of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe PID 2348 wrote to memory of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe PID 2348 wrote to memory of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe PID 2348 wrote to memory of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe PID 2348 wrote to memory of 2688 2348 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe 3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe"C:\Users\Admin\AppData\Local\Temp\3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe"C:\Users\Admin\AppData\Local\Temp\3c37386f3be133776e9754f751b88396a17d0030105646d373e82e8e0a79fe3c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2348-6-0x0000000000730000-0x000000000073E000-memory.dmpFilesize
56KB
-
memory/2348-13-0x0000000073FD0000-0x00000000746BE000-memory.dmpFilesize
6.9MB
-
memory/2348-2-0x0000000004C20000-0x0000000004C60000-memory.dmpFilesize
256KB
-
memory/2348-3-0x00000000004B0000-0x00000000004C4000-memory.dmpFilesize
80KB
-
memory/2348-4-0x0000000073FD0000-0x00000000746BE000-memory.dmpFilesize
6.9MB
-
memory/2348-5-0x0000000004C20000-0x0000000004C60000-memory.dmpFilesize
256KB
-
memory/2348-1-0x0000000073FD0000-0x00000000746BE000-memory.dmpFilesize
6.9MB
-
memory/2348-7-0x0000000005640000-0x00000000056AE000-memory.dmpFilesize
440KB
-
memory/2348-0-0x0000000000950000-0x00000000009E0000-memory.dmpFilesize
576KB
-
memory/2688-8-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2688-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2688-12-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2688-9-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2688-14-0x00000000009E0000-0x0000000000CE3000-memory.dmpFilesize
3.0MB
-
memory/2688-15-0x00000000009E0000-0x0000000000CE3000-memory.dmpFilesize
3.0MB