Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe
Resource
win7-20230831-en
General
-
Target
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe
-
Size
710KB
-
MD5
493562fc3240d634f797be4a433d72c7
-
SHA1
92569595aa0a20d9937bd03525a756dd35059d3b
-
SHA256
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b
-
SHA512
70eb16d06d38d80cc4513962f6fbdeda54e6ec2bc30caa9fb112d3cd355b12c088426c823d3d4a3e315209b3fc908c0339e9cdc8de99462e87eba311f4801a75
-
SSDEEP
12288:406gna2iNP1UIkvEbtOgVt3KB6bxxXRZEG/p8fD5mcjtqlg6utz5l96OXaq:XTa1F14ot1aIxxAop+mc0g6MNa
Malware Config
Extracted
formbook
4.1
ro12
start399.com
decyfincoin.com
binguozhijiaok.com
one45.vip
55dy5s.top
regmt.pro
2ahxgaafifl.com
xn--6rtp2flvfc2h.com
justinmburns.com
los3.online
fleshaaikensdivinegiven7llc.com
servicedelv.services
apexcaryhomesforsale.com
shuraop.xyz
sagetotal.com
gratitude-et-compagnie.com
riderarea.com
digitalserviceact.online
contentbyc.com
agenda-digital-planner.com
senior-living-91799.bond
navigationexperiments.com
tiktok-shop-he.com
qualityquickprints.com
ddbetting.com
navigatenuggets.com
indiannaturals.online
xzgx360.com
xlrj.asia
seagaming.net
saltcasing.info
pq-es.com
doubleapus.com
speedgallery.shop
millions-fans.com
ktrandnews.com
niaeoer.com
60plusmen.com
nala.dev
costanotaryservice.com
palokallio.net
sportsynergyemporium.fun
fathomtackle.com
computer-chronicles.com
valeriaestate.com
holzleisten24.shop
ps212naming.com
blessed-autos.com
rptiki.com
bjykswkj.com
vorbergh.info
ssongg273.cfd
thevitaminstore.store
easyeats307.com
mcied.link
ssongg1620.cfd
y-12federalcreditunion.top
jlh777.com
no5th3267.top
toolifyonline.com
hcsjwdy.com
ypwvj8.top
hja357b.com
bajie6.com
pwpholdings.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exedescription pid process target process PID 2204 set thread context of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exepid process 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 1664 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exedescription pid process Token: SeDebugPrivilege 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exedescription pid process target process PID 2204 wrote to memory of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe PID 2204 wrote to memory of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe PID 2204 wrote to memory of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe PID 2204 wrote to memory of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe PID 2204 wrote to memory of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe PID 2204 wrote to memory of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe PID 2204 wrote to memory of 1664 2204 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe 6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe"C:\Users\Admin\AppData\Local\Temp\6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe"C:\Users\Admin\AppData\Local\Temp\6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-