Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05-10-2023 11:37
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
General
-
Target
tmp.exe
-
Size
310KB
-
MD5
da83ec739bfe2751dadf73b88a2d4de3
-
SHA1
5122f9be87149ad355f0cbf33ca3ae603432b5d2
-
SHA256
dc999aa2db84e4f91022be10a55e971c49da82960027b7482b44856fee46f9cc
-
SHA512
358679f4da6265685f6d41aa159220a3dc80e6a76b0dc4e57bc548394acf6507622dfc09ef86dcb892e32d72c6be5af1fce57b3562d4bc8d3bc646ae3afee8c3
-
SSDEEP
6144:LnPdudwDzV7hvMwtSPqGas8x0UAHsvEt57FFUxgbddgAcuWm5M2:LnPdvhsZyAEEvFFUxgbRM2
Malware Config
Extracted
formbook
4.1
sy22
vinteligencia.com
displayfridges.fun
completetip.com
giallozafferrano.com
jizihao1.com
mysticheightstrail.com
fourseasonslb.com
kjnala.shop
mosiacwall.com
vandistreet.com
gracefullytouchedartistry.com
hbiwhwr.shop
mfmz.net
hrmbrillianz.com
funwarsztat.com
polewithcandy.com
ourrajasthan.com
wilhouettteamerica.com
johnnystintshop.com
asgnelwin.com
alcmcyu.com
thwmlohr.click
gypseascuba.com
mysonisgaythemovie.com
sunriseautostorellc.com
fuhouse.link
motorcycleglassesshop.com
vaskaworldairways.com
qixservice.online
b2b-scaling.com
03ss.vip
trishpintar.com
gk84.com
omclaval.com
emeeycarwash.com
wb7mnp.com
kimgj.com
278809.com
summitstracecolumbus.com
dryadai.com
vistcreative.com
weoliveorder.com
kwamitikki.com
cjk66.online
travisline.pro
mercardosupltda.shop
sunspotplumbing.com
podplugca.com
leontellez.com
fzturf.com
docomo-mobileconsulting.com
apneabirmingham.info
rollesgraciejiujitsu.com
sx15k.com
kebobcapital.com
91967.net
claudiaduverglas.com
zhperviepixie.com
oliwas.xyz
flowersinspace.tech
uadmxqby.click
greatbaitusa.com
drpenawaraircondhargarahmah.com
sofbks.top
sarthaksrishticreation.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2628-10-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
bdmuxzu.exebdmuxzu.exepid process 2684 bdmuxzu.exe 2628 bdmuxzu.exe -
Loads dropped DLL 5 IoCs
Processes:
tmp.exebdmuxzu.exeWerFault.exepid process 1680 tmp.exe 2684 bdmuxzu.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bdmuxzu.exedescription pid process target process PID 2684 set thread context of 2628 2684 bdmuxzu.exe bdmuxzu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2764 2628 WerFault.exe bdmuxzu.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
bdmuxzu.exepid process 2684 bdmuxzu.exe 2684 bdmuxzu.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
tmp.exebdmuxzu.exebdmuxzu.exedescription pid process target process PID 1680 wrote to memory of 2684 1680 tmp.exe bdmuxzu.exe PID 1680 wrote to memory of 2684 1680 tmp.exe bdmuxzu.exe PID 1680 wrote to memory of 2684 1680 tmp.exe bdmuxzu.exe PID 1680 wrote to memory of 2684 1680 tmp.exe bdmuxzu.exe PID 2684 wrote to memory of 2628 2684 bdmuxzu.exe bdmuxzu.exe PID 2684 wrote to memory of 2628 2684 bdmuxzu.exe bdmuxzu.exe PID 2684 wrote to memory of 2628 2684 bdmuxzu.exe bdmuxzu.exe PID 2684 wrote to memory of 2628 2684 bdmuxzu.exe bdmuxzu.exe PID 2684 wrote to memory of 2628 2684 bdmuxzu.exe bdmuxzu.exe PID 2628 wrote to memory of 2764 2628 bdmuxzu.exe WerFault.exe PID 2628 wrote to memory of 2764 2628 bdmuxzu.exe WerFault.exe PID 2628 wrote to memory of 2764 2628 bdmuxzu.exe WerFault.exe PID 2628 wrote to memory of 2764 2628 bdmuxzu.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"C:\Users\Admin\AppData\Local\Temp\bdmuxzu.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 364⤵
- Loads dropped DLL
- Program crash
PID:2764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
205KB
MD580405658fbbf7c2bde5c54656cc3282b
SHA196c9716132a64388609b103c3e32385653153366
SHA256a1b2102fc79de307f0a816f3c0cc3a0807f25517db6dff4194c2d7e7bf5ba693
SHA512c5e899b93a7efe2a823c3324236deda97d4354d7b5058be89b22a310942a26acb095847276c89dd90b1cba8ee33210839b590c08cc8eec03c2e5687c1f3d01fa
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508
-
Filesize
171KB
MD54b59d30a0dfe2ef576a684738840836f
SHA12648e01c6e47e0878df86d07e6171de62c2bf6db
SHA2565ab248198de9803f51b17aaa8401a293219f8199699f6ebe6152ad33c7b11a8b
SHA512bba64225181183edfd7514ca46ab3102e47411ff47fe957d12873cc1d175b916afdc467dd0377ecfc112f66c6cc9234949574e0dfe28ed53803341a4b165e508