Analysis
-
max time kernel
126s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
01-11-2023 05:15
Static task
static1
General
-
Target
88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe
-
Size
744KB
-
MD5
5c09000c1e5da74778d77be881f87810
-
SHA1
dcf203cbe2ad9ed6e588c708a5819a3c9c98b660
-
SHA256
88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8
-
SHA512
30ee1863ee28ab4a638cf5fd09466edeb2a62047e7d51b5b841a1b41f0209bcf40fd5231dd13ac6526bf0c14b1c72585a5cb67a6c273b9209c7ecbc2488b21fc
-
SSDEEP
12288:sboaxr4plPNelaqHFsQe2WzKr/BnGzsIQTLsjT7zkTcAoPFOA0TOdYqWOEnOEuVe:WMl8laAFsQ7r/BSsIQTCT7zkT6qadFW7
Malware Config
Extracted
formbook
4.1
4hc5
amandaastburyillustration.com
7141999.com
showshoe.info
sagemarlin.com
lithuaniandreamtime.com
therenixgroupllc.com
avalialooks.shop
vurporn.com
lemmy.systems
2816goldfinch.com
pacersun.com
checktrace.com
loadtransfer.site
matsuri-jujutsukaisen.com
iontrapper.science
5108010.com
beidixi.com
21305599.com
peakvitality.fitness
osisfeelingfee.com
hotshark-shop.com
bollywood.nexus
stephenplattassociatesllp.com
bakepreneurs.com
claudiobarros.online
akabou-hayasaka.com
collibrishop.online
britishfemalevo.com
prestigesmp.online
wzmatics.com
sactribune.com
slotjitu88.website
theproactiveexpat.com
therealnikib.com
elnoh.life
tianyan110.com
tcbbuilds.com
zhe276.com
c1405.com
candicrem.com
lambdasigmarho.com
gemwhk.store
crissmendez.com
locduongseafood.com
jessformdsenate.info
329.bio
nbgonghe.com
tr-ij.com
quailrun-inc.com
pathlightpropertiesmgt.com
lpqxmz.site
castlegrouplt.com
beautybylily.com
bernabeicarniceriaygranja.com
spicax.com
globalentertainmentservices.com
modluxenwa.com
imaswe.com
hntv6201.top
homerevamps.today
motionmixmedia.com
antojitoslosramos.com
julieslive.com
bepnuclasechia.com
iqixuehe.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/5068-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1880 set thread context of 5068 1880 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 71 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5068 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 5068 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1880 wrote to memory of 5068 1880 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 71 PID 1880 wrote to memory of 5068 1880 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 71 PID 1880 wrote to memory of 5068 1880 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 71 PID 1880 wrote to memory of 5068 1880 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 71 PID 1880 wrote to memory of 5068 1880 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 71 PID 1880 wrote to memory of 5068 1880 88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe"C:\Users\Admin\AppData\Local\Temp\88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe"C:\Users\Admin\AppData\Local\Temp\88558ffe27726373b0cb9ce9a5d612ab009a1693487e366a32c55ec16e5b8ab8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-