Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2023 09:51
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
General
-
Target
tmp.exe
-
Size
310KB
-
MD5
da83ec739bfe2751dadf73b88a2d4de3
-
SHA1
5122f9be87149ad355f0cbf33ca3ae603432b5d2
-
SHA256
dc999aa2db84e4f91022be10a55e971c49da82960027b7482b44856fee46f9cc
-
SHA512
358679f4da6265685f6d41aa159220a3dc80e6a76b0dc4e57bc548394acf6507622dfc09ef86dcb892e32d72c6be5af1fce57b3562d4bc8d3bc646ae3afee8c3
-
SSDEEP
6144:LnPdudwDzV7hvMwtSPqGas8x0UAHsvEt57FFUxgbddgAcuWm5M2:LnPdvhsZyAEEvFFUxgbRM2
Malware Config
Extracted
formbook
4.1
sy22
vinteligencia.com
displayfridges.fun
completetip.com
giallozafferrano.com
jizihao1.com
mysticheightstrail.com
fourseasonslb.com
kjnala.shop
mosiacwall.com
vandistreet.com
gracefullytouchedartistry.com
hbiwhwr.shop
mfmz.net
hrmbrillianz.com
funwarsztat.com
polewithcandy.com
ourrajasthan.com
wilhouettteamerica.com
johnnystintshop.com
asgnelwin.com
alcmcyu.com
thwmlohr.click
gypseascuba.com
mysonisgaythemovie.com
sunriseautostorellc.com
fuhouse.link
motorcycleglassesshop.com
vaskaworldairways.com
qixservice.online
b2b-scaling.com
03ss.vip
trishpintar.com
gk84.com
omclaval.com
emeeycarwash.com
wb7mnp.com
kimgj.com
278809.com
summitstracecolumbus.com
dryadai.com
vistcreative.com
weoliveorder.com
kwamitikki.com
cjk66.online
travisline.pro
mercardosupltda.shop
sunspotplumbing.com
podplugca.com
leontellez.com
fzturf.com
docomo-mobileconsulting.com
apneabirmingham.info
rollesgraciejiujitsu.com
sx15k.com
kebobcapital.com
91967.net
claudiaduverglas.com
zhperviepixie.com
oliwas.xyz
flowersinspace.tech
uadmxqby.click
greatbaitusa.com
drpenawaraircondhargarahmah.com
sofbks.top
sarthaksrishticreation.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3492-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3492-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2096-18-0x0000000000AA0000-0x0000000000ACF000-memory.dmp formbook behavioral2/memory/2096-20-0x0000000000AA0000-0x0000000000ACF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
bdmuxzu.exebdmuxzu.exepid process 112 bdmuxzu.exe 3492 bdmuxzu.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
bdmuxzu.exebdmuxzu.exerundll32.exedescription pid process target process PID 112 set thread context of 3492 112 bdmuxzu.exe bdmuxzu.exe PID 3492 set thread context of 748 3492 bdmuxzu.exe Explorer.EXE PID 2096 set thread context of 748 2096 rundll32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
bdmuxzu.exerundll32.exepid process 3492 bdmuxzu.exe 3492 bdmuxzu.exe 3492 bdmuxzu.exe 3492 bdmuxzu.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 748 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
bdmuxzu.exebdmuxzu.exerundll32.exepid process 112 bdmuxzu.exe 3492 bdmuxzu.exe 3492 bdmuxzu.exe 3492 bdmuxzu.exe 2096 rundll32.exe 2096 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
bdmuxzu.exerundll32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3492 bdmuxzu.exe Token: SeDebugPrivilege 2096 rundll32.exe Token: SeShutdownPrivilege 748 Explorer.EXE Token: SeCreatePagefilePrivilege 748 Explorer.EXE Token: SeShutdownPrivilege 748 Explorer.EXE Token: SeCreatePagefilePrivilege 748 Explorer.EXE Token: SeShutdownPrivilege 748 Explorer.EXE Token: SeCreatePagefilePrivilege 748 Explorer.EXE Token: SeShutdownPrivilege 748 Explorer.EXE Token: SeCreatePagefilePrivilege 748 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 748 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
tmp.exebdmuxzu.exeExplorer.EXErundll32.exedescription pid process target process PID 4912 wrote to memory of 112 4912 tmp.exe bdmuxzu.exe PID 4912 wrote to memory of 112 4912 tmp.exe bdmuxzu.exe PID 4912 wrote to memory of 112 4912 tmp.exe bdmuxzu.exe PID 112 wrote to memory of 3492 112 bdmuxzu.exe bdmuxzu.exe PID 112 wrote to memory of 3492 112 bdmuxzu.exe bdmuxzu.exe PID 112 wrote to memory of 3492 112 bdmuxzu.exe bdmuxzu.exe PID 112 wrote to memory of 3492 112 bdmuxzu.exe bdmuxzu.exe PID 748 wrote to memory of 2096 748 Explorer.EXE rundll32.exe PID 748 wrote to memory of 2096 748 Explorer.EXE rundll32.exe PID 748 wrote to memory of 2096 748 Explorer.EXE rundll32.exe PID 2096 wrote to memory of 2568 2096 rundll32.exe cmd.exe PID 2096 wrote to memory of 2568 2096 rundll32.exe cmd.exe PID 2096 wrote to memory of 2568 2096 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"3⤵PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
205KB
MD580405658fbbf7c2bde5c54656cc3282b
SHA196c9716132a64388609b103c3e32385653153366
SHA256a1b2102fc79de307f0a816f3c0cc3a0807f25517db6dff4194c2d7e7bf5ba693
SHA512c5e899b93a7efe2a823c3324236deda97d4354d7b5058be89b22a310942a26acb095847276c89dd90b1cba8ee33210839b590c08cc8eec03c2e5687c1f3d01fa