Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2023 14:05
Static task
static1
Behavioral task
behavioral1
Sample
aeMGQio1TJuPBzR.exe
Resource
win7-20230831-en
General
-
Target
aeMGQio1TJuPBzR.exe
-
Size
665KB
-
MD5
5ae74ac0fe21a6a624f680a5d9ea7959
-
SHA1
c9121ba150a388a93078a5e5f51a9d46234ff418
-
SHA256
cda350f17f9da84bd3c76f325656630c4724eeaa08949d9d99941859bf8f0315
-
SHA512
27372957da07e97f756d8b1b2571b4b12592a67e3caf4a2152114d42bcd074164f770c8793f7fec8adc000b06db9637520ffa742e5947dafb9ac72950abd6c68
-
SSDEEP
12288:2dfSRtdn2lq3PaiXoJT7VXktGsBb9x+2OvPk0EGHkRk6jpM:2wn2lq3yiaTxktGst9S2GHkRpjp
Malware Config
Extracted
formbook
4.1
u1r9
brightlegalclub.com
90008555.com
nakedfitness.club
asdfcdxsz.link
ocp9z047.click
1xbet-znx.top
takmeeiiom.online
loveofacoffee.com
elodieshiatsu-bienetre.com
waijaihome.com
loanslatvia.today
nbdgt.club
celicrt.online
onsitecomputers.net
learnwithfad.com
civilservice.app
grecoemploymentlaw.com
7780to1.com
ontimefishing.com
extremepaverfl.com
naturaloilhealth.com
50360.site
hermankathy.com
akira11.com
foodingre.com
succeedwithammari.com
ealbuainain.com
kbmvawmx.click
nsfwoutfits.site
french-online.com
xingdong2976.ltd
terapiatramandai.page
gowkxvcj.click
ojkip.icu
gurumicrochet.store
appetencyllc.com
devasian.com
getkalendeargpt40.com
billmerickel.com
lyncolnvalenca.com
53dorethyrd.com
dhruvshethdm.com
xcsqgmhl.click
rentvanchauffeur.com
michellejpnmiller.shop
jeffrymedrx.com
rootsofallevil.com
caitlincdonohue.com
55522.tech
rkdcvrfj.click
caraidautorepair.com
ddicg.cyou
teruakisakoda.com
rngzel.com
hvkmrnpq.click
thepennsylvaniatimes.com
frenchyfridaysmiami.com
wardalnajoomlandscape.com
getweb3domains.com
raziilcloud.com
riad-isis.com
zypern-geheimtipps.com
echgsous.click
dumpsterrentalsdelaware.com
whatyouroncologistmissed.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1972-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1972-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1760-20-0x0000000000380000-0x00000000003AF000-memory.dmp formbook behavioral2/memory/1760-22-0x0000000000380000-0x00000000003AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 740 set thread context of 1972 740 aeMGQio1TJuPBzR.exe 92 PID 1972 set thread context of 3160 1972 aeMGQio1TJuPBzR.exe 38 PID 1760 set thread context of 3160 1760 netsh.exe 38 -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1972 aeMGQio1TJuPBzR.exe 1972 aeMGQio1TJuPBzR.exe 1972 aeMGQio1TJuPBzR.exe 1972 aeMGQio1TJuPBzR.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe 1760 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3160 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1972 aeMGQio1TJuPBzR.exe 1972 aeMGQio1TJuPBzR.exe 1972 aeMGQio1TJuPBzR.exe 1760 netsh.exe 1760 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1972 aeMGQio1TJuPBzR.exe Token: SeDebugPrivilege 1760 netsh.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3160 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 740 wrote to memory of 1972 740 aeMGQio1TJuPBzR.exe 92 PID 740 wrote to memory of 1972 740 aeMGQio1TJuPBzR.exe 92 PID 740 wrote to memory of 1972 740 aeMGQio1TJuPBzR.exe 92 PID 740 wrote to memory of 1972 740 aeMGQio1TJuPBzR.exe 92 PID 740 wrote to memory of 1972 740 aeMGQio1TJuPBzR.exe 92 PID 740 wrote to memory of 1972 740 aeMGQio1TJuPBzR.exe 92 PID 3160 wrote to memory of 1760 3160 Explorer.EXE 93 PID 3160 wrote to memory of 1760 3160 Explorer.EXE 93 PID 3160 wrote to memory of 1760 3160 Explorer.EXE 93 PID 1760 wrote to memory of 4852 1760 netsh.exe 94 PID 1760 wrote to memory of 4852 1760 netsh.exe 94 PID 1760 wrote to memory of 4852 1760 netsh.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\aeMGQio1TJuPBzR.exe"C:\Users\Admin\AppData\Local\Temp\aeMGQio1TJuPBzR.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\aeMGQio1TJuPBzR.exe"C:\Users\Admin\AppData\Local\Temp\aeMGQio1TJuPBzR.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\aeMGQio1TJuPBzR.exe"3⤵PID:4852
-
-