Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
841031a37159398b8eebca7bb7eff56b.exe
Resource
win7-20231020-en
General
-
Target
841031a37159398b8eebca7bb7eff56b.exe
-
Size
813KB
-
MD5
841031a37159398b8eebca7bb7eff56b
-
SHA1
1848cf9917341a151a4cd8c3ff041525a4d075eb
-
SHA256
0ad9757a6895b3595b4eaa5a71cca88d658a1c21f335b8d3268949d659e27fda
-
SHA512
703be883819631d73c3ecdaab42b73464b1e81072d68a665d551dcc393d3b2b002bf2929a6a9b1f1b17e6de352458bbffe6a7e24a463fe661549202b7bcf42d7
-
SSDEEP
12288:TMGI/MtgR/mZRM+BYkElTBtzeACtg1Uf10nhLnxeTLE39oexn3SJ:p1gkZR5+k2Dk10nsL4eexn
Malware Config
Extracted
formbook
4.1
rs10
starryallure.com
mania-31.online
baba-bt-top1.buzz
jwilkinsartscapeinc.com
tallerhazop.com
lulu013.com
pontoimediato.com
stmc-company.com
thesoftwarepractitioner.com
makemoneywithsherrie.com
algaroba.com
smartbookmarks.info
burneysaw.com
fftsxxx.top
hvr998.com
sofisticars.store
clickit.fun
couches-sofas-16683.bond
ikkasolutions.com
oakvisa.com
totalkfood.com
guillaumecarreau.com
biomagnetismocolombia.com
jrszhiboz.com
rewmio.xyz
willowliy.com
calm-plants.com
robertjamesfineclothing.com
wgardsgm.live
dngbdk9jpusxpwr.com
slycepicklegear.com
mtauratarnt.com
simolified.com
mekkamochi.com
deeprootedleader.com
container-houses-vn.click
roundaboutlogistics.com
m-baer.com
electric-cars-19095.bond
destinydinos.com
taxretentionstrategiesgroup.com
zg9tywlubmftzw5ldzi0mdm.com
cleaning-products-29334.bond
metaastrologia.com
practicaloutsource.com
w1nb74.top
just-one.info
cryptarrow.com
omarshafie.online
latitudeinformatics.com
fhstbanknigeria.com
hdlive7.live
laserhairremovalkit.com
into-org.com
kzjsm.com
juara102-azura.com
digitsum.com
cabins-prefab.online
allisonparlinart.com
cpsgrantstream.com
everythingbutthetruck.com
w6k3v.com
alfarizkigrup.com
gs3ekdj3ixe.asia
nightoracle.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2580-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2628 set thread context of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2628 841031a37159398b8eebca7bb7eff56b.exe 2628 841031a37159398b8eebca7bb7eff56b.exe 2628 841031a37159398b8eebca7bb7eff56b.exe 2628 841031a37159398b8eebca7bb7eff56b.exe 2628 841031a37159398b8eebca7bb7eff56b.exe 2628 841031a37159398b8eebca7bb7eff56b.exe 2628 841031a37159398b8eebca7bb7eff56b.exe 2628 841031a37159398b8eebca7bb7eff56b.exe 2580 841031a37159398b8eebca7bb7eff56b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2628 841031a37159398b8eebca7bb7eff56b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2824 2628 841031a37159398b8eebca7bb7eff56b.exe 30 PID 2628 wrote to memory of 2824 2628 841031a37159398b8eebca7bb7eff56b.exe 30 PID 2628 wrote to memory of 2824 2628 841031a37159398b8eebca7bb7eff56b.exe 30 PID 2628 wrote to memory of 2824 2628 841031a37159398b8eebca7bb7eff56b.exe 30 PID 2628 wrote to memory of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31 PID 2628 wrote to memory of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31 PID 2628 wrote to memory of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31 PID 2628 wrote to memory of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31 PID 2628 wrote to memory of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31 PID 2628 wrote to memory of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31 PID 2628 wrote to memory of 2580 2628 841031a37159398b8eebca7bb7eff56b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\841031a37159398b8eebca7bb7eff56b.exe"C:\Users\Admin\AppData\Local\Temp\841031a37159398b8eebca7bb7eff56b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\841031a37159398b8eebca7bb7eff56b.exe"C:\Users\Admin\AppData\Local\Temp\841031a37159398b8eebca7bb7eff56b.exe"2⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\841031a37159398b8eebca7bb7eff56b.exe"C:\Users\Admin\AppData\Local\Temp\841031a37159398b8eebca7bb7eff56b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-