Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b_JC.exe
Resource
win7-20230831-en
General
-
Target
633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b_JC.exe
-
Size
394KB
-
MD5
3d7420d1cf88e1ffc6d0dd85314fbfb5
-
SHA1
00af90a66e1be8974ef99d2630e905213aa7548f
-
SHA256
633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b
-
SHA512
20e0a4bb331be0004c940875346394bfcb6f387dbf3800859512dd2ef5864b89d5d0d39e1856379b759f35a43756b95be4d32fe574cddb00dfb9a9d1cb47f761
-
SSDEEP
6144:hYa6KmnIocXHUsP93EQNjYDZiJL+JFX+z/Fpv9QQWCHtec1WtvpDi:hY0aIFJ2MkX+HvGCCTi
Malware Config
Extracted
formbook
4.1
ds19
pribit-92.com
wrist-couture.com
alanka.company
uffitgvr.click
bwtsatotravel.com
anpmarketinginc.com
startupsvibes.com
shearabia.com
sayemail5.store
solsticeinstitute.com
perfectholidaydeals.com
xfitness.life
mmbs-ad.com
jacodile.com
hjpolastudio.com
healuu.com
agtwer.homes
installationschampions.info
bettys70th.com
sustainable-re.com
x23171.vip
relationalsolutionstherapy.com
yyds1449.icu
grizzlycolombia.com
digitalreceivables.com
9acv.com
bagelhousecol.com
bigbargainblog.com
international-business.online
lancasar.com
erasmustudy.com
blohdx.online
oatleaves.online
peakperformance-logistics.com
badhatrecords.com
rosyxox.com
rtpgacor500x.live
linkpixel.xyz
7y2ew.store
sexmovies-top.com
ofile.live
hellotest679.com
best-patioawnings.services
theinstallationchampion.com
willwintrading.com
btdjpuif.click
corriere24notizie.com
yvowveio.click
ofildubienetre.com
ma5z3ze9.site
sirvanaspirit.com
gamblezen.biz
sambhabmishra.com
bloodhound-tracker.net
artsyblevs.com
rimalelectrical.com
martekkereste.com
wxrdtmxr.click
formula1413.click
adecadetomelvin.com
brogetti.com
hippohoodie.com
6868msc.com
viniciusenatalia.com
jepe-olympus.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4424-7-0x0000000000600000-0x000000000062F000-memory.dmp formbook behavioral2/memory/4424-13-0x0000000000600000-0x000000000062F000-memory.dmp formbook behavioral2/memory/3900-19-0x0000000000370000-0x000000000039F000-memory.dmp formbook behavioral2/memory/3900-21-0x0000000000370000-0x000000000039F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2848 zzwxddd.exe 4424 zzwxddd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2848 set thread context of 4424 2848 zzwxddd.exe 83 PID 4424 set thread context of 3156 4424 zzwxddd.exe 45 PID 3900 set thread context of 3156 3900 rundll32.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4424 zzwxddd.exe 4424 zzwxddd.exe 4424 zzwxddd.exe 4424 zzwxddd.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe 3900 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2848 zzwxddd.exe 2848 zzwxddd.exe 4424 zzwxddd.exe 4424 zzwxddd.exe 4424 zzwxddd.exe 3900 rundll32.exe 3900 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4424 zzwxddd.exe Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeDebugPrivilege 3900 rundll32.exe Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3156 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3496 wrote to memory of 2848 3496 633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b_JC.exe 82 PID 3496 wrote to memory of 2848 3496 633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b_JC.exe 82 PID 3496 wrote to memory of 2848 3496 633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b_JC.exe 82 PID 2848 wrote to memory of 4424 2848 zzwxddd.exe 83 PID 2848 wrote to memory of 4424 2848 zzwxddd.exe 83 PID 2848 wrote to memory of 4424 2848 zzwxddd.exe 83 PID 2848 wrote to memory of 4424 2848 zzwxddd.exe 83 PID 3156 wrote to memory of 3900 3156 Explorer.EXE 85 PID 3156 wrote to memory of 3900 3156 Explorer.EXE 85 PID 3156 wrote to memory of 3900 3156 Explorer.EXE 85 PID 3900 wrote to memory of 3440 3900 rundll32.exe 89 PID 3900 wrote to memory of 3440 3900 rundll32.exe 89 PID 3900 wrote to memory of 3440 3900 rundll32.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b_JC.exe"C:\Users\Admin\AppData\Local\Temp\633ccb020bf31ee6dc2d876b157822ebdac8e73f7da640eb58102e6d233cbf2b_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\zzwxddd.exe"C:\Users\Admin\AppData\Local\Temp\zzwxddd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\zzwxddd.exe"C:\Users\Admin\AppData\Local\Temp\zzwxddd.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\zzwxddd.exe"3⤵PID:3440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5e13bda39272eb319974b3cd73f2ca9c3
SHA154e03804758aea72cd624e688b4ec986e63c367e
SHA256e1d64e1f2ea7b2d437d0a5c16c51eb9ee5af6feed477180ce61e9f159fb7a92b
SHA5123aa71b89757bb0f17faadfac649c7a62c13638fc2de6c8faa3c9f2af1ee425007fff3003ed9de8c15102217a5d81b78ddc848299684cae38f47e2a67e37c679d
-
Filesize
200KB
MD52d2cf14c63da40ea9cc6ad177f1f2a33
SHA19c5fe75111ee81d561377cd098d14f4413aa9f57
SHA256334f8134a8ca8ad40529844df8ea3a30c853c9fb7353193ad279021ee34091cc
SHA5120edf2e11bb2d07bf58a8d19cde2c785fb0bb198b4e9ff5ab9595ddfef7923620f88604e304423818e5543ea191524c0517a3afe87e9b0aaa8758af2abe01f45a
-
Filesize
200KB
MD52d2cf14c63da40ea9cc6ad177f1f2a33
SHA19c5fe75111ee81d561377cd098d14f4413aa9f57
SHA256334f8134a8ca8ad40529844df8ea3a30c853c9fb7353193ad279021ee34091cc
SHA5120edf2e11bb2d07bf58a8d19cde2c785fb0bb198b4e9ff5ab9595ddfef7923620f88604e304423818e5543ea191524c0517a3afe87e9b0aaa8758af2abe01f45a
-
Filesize
200KB
MD52d2cf14c63da40ea9cc6ad177f1f2a33
SHA19c5fe75111ee81d561377cd098d14f4413aa9f57
SHA256334f8134a8ca8ad40529844df8ea3a30c853c9fb7353193ad279021ee34091cc
SHA5120edf2e11bb2d07bf58a8d19cde2c785fb0bb198b4e9ff5ab9595ddfef7923620f88604e304423818e5543ea191524c0517a3afe87e9b0aaa8758af2abe01f45a