Analysis
-
max time kernel
72s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08-10-2023 01:29
Static task
static1
Behavioral task
behavioral1
Sample
4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe
Resource
win7-20230831-en
General
-
Target
4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe
-
Size
797KB
-
MD5
4e0a57febe7c13d6f294ea34cbfc5cbf
-
SHA1
f52a1d2cb7613c8fea67466dbbbce684541076a5
-
SHA256
4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875
-
SHA512
47a2824b4dea833948cde7ad378b5a30a58a7b7945695e556c96858a0c11484ccbed6256c3f7c63035b7de02da4d87619fd26de4913313143d617dac651085a7
-
SSDEEP
24576:0uLklAVXeIpaVidw9koilGCKfwd2WQkRv0yw1FuZdu:NLvV+19pilHK4dj9R8Hu+
Malware Config
Extracted
formbook
4.1
ny02
unirewards.online
giaoxuthanhgia.com
jennifersarrasin.online
hotelcampestrelafloresta.com
rwardsuprefortunerabbit.website
wanguardplacements.com
myfittedbedroomboutique.com
romariiregenerative.com
fashionhabesha.online
q778.top
embodiedtruthmethod.online
petgoodies.store
prismeventsandtours.com
onlinedelight.tech
segoviaresidencial.com
livewin.win
qhyhxs.com
kemprut.com
sanghahealing.net
forcewealthpower.com
holiganbet8950.com
soloowl.com
hopefulvision.info
embroideryworkshawaii.com
bimasantya.com
nohtos.com
datanesttechnologies.shop
merv.top
aeras-pro.com
jennylynnphotographer.com
moitraholding.com
masoncaldwell.com
7-11pastors.com
petitepartystyling.com
usedcarsloveland.online
tamrastaxes.com
mithibites.com
thebaddiesclosetxo.com
hellohealthcare.net
auroreal.com
bho3ivq2j52cu5c.xyz
centralfloutpost.com
mulberry-silk.com
cortinasystores.com
ispartaigneiplik.com
trippytreats.club
nueseskincare.com
idsuper-41.online
merbitc.online
twistyourthrottle.com
golivecenter.online
wrirl.fun
goj2ha.top
becas-es-es.bond
q21m.com
refil3d.store
respectomat.com
naturalfoundation.store
myagedcareneeds.com
absisart.com
montanavineyard.com
artoffarm.com
womwealth.com
fureniyxui.com
bockinside.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2968-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2584 set thread context of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 2968 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2148 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 30 PID 2584 wrote to memory of 2148 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 30 PID 2584 wrote to memory of 2148 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 30 PID 2584 wrote to memory of 2148 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 30 PID 2584 wrote to memory of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31 PID 2584 wrote to memory of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31 PID 2584 wrote to memory of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31 PID 2584 wrote to memory of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31 PID 2584 wrote to memory of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31 PID 2584 wrote to memory of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31 PID 2584 wrote to memory of 2968 2584 4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe"C:\Users\Admin\AppData\Local\Temp\4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe"C:\Users\Admin\AppData\Local\Temp\4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe"2⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe"C:\Users\Admin\AppData\Local\Temp\4af5374d05140e1ebf05625397c061e7e6e6396597399880f903cdda22466875.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-