Analysis
-
max time kernel
155s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe
Resource
win7-20231023-en
General
-
Target
287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe
-
Size
1.7MB
-
MD5
241cdb0904844ba61a4058b567f79370
-
SHA1
1f734501276fd771b8998b55221cbb425c613906
-
SHA256
287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8
-
SHA512
787fc29278f50d9a57823a4a77360090d11189408dd8f4d151a0a8e49c3cad29cc3017b3103599197dba720ef8561e7f9e912366d749e07aed097b0c77f41a1b
-
SSDEEP
24576:PmqruRzSJcuXCyWs2lRxm/WhDZ96EpfNcA10O2C:PuRzSJcuXpWHlvm/WhH6EpfNcAGO2C
Malware Config
Extracted
formbook
4.1
hs94
hrnlius.com
righthouse39.store
nh12dgsdh.top
d6es.com
qjgx8ol.xyz
claricraft.com
amor-de-luxo.com
triokitchenbar.com
britlleysantos.com
hairluxe.info
openclosetstore.com
edubraintoys.com
goldeneaglescoin.com
mayacottage.com
taekyoong.com
mahiguel.com
dramulyamullapudi.com
osaruru.com
momaustralia.com
xiaotu.gay
gokenko.com
simplywarehouses.com
jacketshops.com
pranayketineni.com
wmrnyy.icu
fmloo23.top
annadoshina.online
dhctpsp.com
jjjj88888.com
agentoto.life
siterapido.click
ursrobotics.online
sdrsg.top
buzzatbuzz.com
hzliping.com
susanwolff.com
mikexkwt9sd.com
fdd7021.com
taltusinvestimentos.com
tommilye.com
cartoonteeshood.com
loginputra.xyz
digibyten.com
qjzg607.com
scxf.xyz
dfkld.fun
gyaantree.com
icarepassport.com
netflixmirorr.com
buyfirstratefinds.com
rosaebody.com
kavabarsforsale.com
nudeaunts.com
shjmele.com
351660.com
masukslotgacor.top
calcium2049.pro
boldshop1.click
early-lung-cancer-signs.bond
zibloo.com
dafacoins.com
lotte-finance.icu
betaverse204.com
surptb.xyz
5stargeneralcontractor.net
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2264-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2264-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/844-20-0x0000000000A40000-0x0000000000A6F000-memory.dmp formbook behavioral2/memory/844-22-0x0000000000A40000-0x0000000000A6F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2272 set thread context of 2264 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 92 PID 2264 set thread context of 3096 2264 InstallUtil.exe 52 PID 844 set thread context of 3096 844 systray.exe 52 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 2264 InstallUtil.exe 2264 InstallUtil.exe 2264 InstallUtil.exe 2264 InstallUtil.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe 844 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3096 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2264 InstallUtil.exe 2264 InstallUtil.exe 2264 InstallUtil.exe 844 systray.exe 844 systray.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe Token: SeDebugPrivilege 2264 InstallUtil.exe Token: SeDebugPrivilege 844 systray.exe Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3096 Explorer.EXE 3096 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3096 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3892 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 89 PID 2272 wrote to memory of 3892 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 89 PID 2272 wrote to memory of 3892 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 89 PID 2272 wrote to memory of 1312 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 90 PID 2272 wrote to memory of 1312 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 90 PID 2272 wrote to memory of 1312 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 90 PID 2272 wrote to memory of 3744 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 91 PID 2272 wrote to memory of 3744 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 91 PID 2272 wrote to memory of 3744 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 91 PID 2272 wrote to memory of 2264 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 92 PID 2272 wrote to memory of 2264 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 92 PID 2272 wrote to memory of 2264 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 92 PID 2272 wrote to memory of 2264 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 92 PID 2272 wrote to memory of 2264 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 92 PID 2272 wrote to memory of 2264 2272 287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe 92 PID 3096 wrote to memory of 844 3096 Explorer.EXE 94 PID 3096 wrote to memory of 844 3096 Explorer.EXE 94 PID 3096 wrote to memory of 844 3096 Explorer.EXE 94 PID 844 wrote to memory of 1212 844 systray.exe 100 PID 844 wrote to memory of 1212 844 systray.exe 100 PID 844 wrote to memory of 1212 844 systray.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe"C:\Users\Admin\AppData\Local\Temp\287a3e38227ec9d2a0fcebfdfedbe1f8ac01fda9f654c173184dd7956ca31cd8.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:3892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:3744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1212
-
-