Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21-09-2023 01:09
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
General
-
Target
tmp.exe
-
Size
710KB
-
MD5
493562fc3240d634f797be4a433d72c7
-
SHA1
92569595aa0a20d9937bd03525a756dd35059d3b
-
SHA256
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b
-
SHA512
70eb16d06d38d80cc4513962f6fbdeda54e6ec2bc30caa9fb112d3cd355b12c088426c823d3d4a3e315209b3fc908c0339e9cdc8de99462e87eba311f4801a75
-
SSDEEP
12288:406gna2iNP1UIkvEbtOgVt3KB6bxxXRZEG/p8fD5mcjtqlg6utz5l96OXaq:XTa1F14ot1aIxxAop+mc0g6MNa
Malware Config
Extracted
formbook
4.1
ro12
start399.com
decyfincoin.com
binguozhijiaok.com
one45.vip
55dy5s.top
regmt.pro
2ahxgaafifl.com
xn--6rtp2flvfc2h.com
justinmburns.com
los3.online
fleshaaikensdivinegiven7llc.com
servicedelv.services
apexcaryhomesforsale.com
shuraop.xyz
sagetotal.com
gratitude-et-compagnie.com
riderarea.com
digitalserviceact.online
contentbyc.com
agenda-digital-planner.com
senior-living-91799.bond
navigationexperiments.com
tiktok-shop-he.com
qualityquickprints.com
ddbetting.com
navigatenuggets.com
indiannaturals.online
xzgx360.com
xlrj.asia
seagaming.net
saltcasing.info
pq-es.com
doubleapus.com
speedgallery.shop
millions-fans.com
ktrandnews.com
niaeoer.com
60plusmen.com
nala.dev
costanotaryservice.com
palokallio.net
sportsynergyemporium.fun
fathomtackle.com
computer-chronicles.com
valeriaestate.com
holzleisten24.shop
ps212naming.com
blessed-autos.com
rptiki.com
bjykswkj.com
vorbergh.info
ssongg273.cfd
thevitaminstore.store
easyeats307.com
mcied.link
ssongg1620.cfd
y-12federalcreditunion.top
jlh777.com
no5th3267.top
toolifyonline.com
hcsjwdy.com
ypwvj8.top
hja357b.com
bajie6.com
pwpholdings.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2932-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2932-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2520-21-0x0000000000070000-0x000000000009F000-memory.dmp formbook behavioral1/memory/2520-23-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2652 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tmp.exetmp.exewscript.exedescription pid process target process PID 2172 set thread context of 2932 2172 tmp.exe tmp.exe PID 2932 set thread context of 1244 2932 tmp.exe Explorer.EXE PID 2520 set thread context of 1244 2520 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
tmp.exetmp.exewscript.exepid process 2172 tmp.exe 2172 tmp.exe 2172 tmp.exe 2172 tmp.exe 2172 tmp.exe 2172 tmp.exe 2172 tmp.exe 2932 tmp.exe 2932 tmp.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe 2520 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
tmp.exewscript.exepid process 2932 tmp.exe 2932 tmp.exe 2932 tmp.exe 2520 wscript.exe 2520 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tmp.exetmp.exewscript.exedescription pid process Token: SeDebugPrivilege 2172 tmp.exe Token: SeDebugPrivilege 2932 tmp.exe Token: SeDebugPrivilege 2520 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
tmp.exeExplorer.EXEwscript.exedescription pid process target process PID 2172 wrote to memory of 2932 2172 tmp.exe tmp.exe PID 2172 wrote to memory of 2932 2172 tmp.exe tmp.exe PID 2172 wrote to memory of 2932 2172 tmp.exe tmp.exe PID 2172 wrote to memory of 2932 2172 tmp.exe tmp.exe PID 2172 wrote to memory of 2932 2172 tmp.exe tmp.exe PID 2172 wrote to memory of 2932 2172 tmp.exe tmp.exe PID 2172 wrote to memory of 2932 2172 tmp.exe tmp.exe PID 1244 wrote to memory of 2520 1244 Explorer.EXE wscript.exe PID 1244 wrote to memory of 2520 1244 Explorer.EXE wscript.exe PID 1244 wrote to memory of 2520 1244 Explorer.EXE wscript.exe PID 1244 wrote to memory of 2520 1244 Explorer.EXE wscript.exe PID 2520 wrote to memory of 2652 2520 wscript.exe cmd.exe PID 2520 wrote to memory of 2652 2520 wscript.exe cmd.exe PID 2520 wrote to memory of 2652 2520 wscript.exe cmd.exe PID 2520 wrote to memory of 2652 2520 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Deletes itself
PID:2652
-
-