Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 11:07
Static task
static1
Behavioral task
behavioral1
Sample
514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe
Resource
win7-20231023-en
General
-
Target
514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe
-
Size
1.7MB
-
MD5
f68b936e01d0fe86629f55b5f4de3405
-
SHA1
dc8f0f005d0fd3a8c508f8e2e12a324440bb5164
-
SHA256
514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339
-
SHA512
9db64b2e675a741e165d6d65d3c2bdf7b2126a018b0ce1e1a92daf4fabbad5e40bd25bf913d59e0f7ea1ac03b081cab7f0de1f56ca9f7360df24b485dcc7263b
-
SSDEEP
24576:A/jWyB2cRZnMMWRk2Cm+OXpDLO/hLK6xXjV3MBsnd:A/jrBBRZnMJRk2H+OVLO/hLK6xXqg
Malware Config
Extracted
formbook
4.1
hs94
hrnlius.com
righthouse39.store
nh12dgsdh.top
d6es.com
qjgx8ol.xyz
claricraft.com
amor-de-luxo.com
triokitchenbar.com
britlleysantos.com
hairluxe.info
openclosetstore.com
edubraintoys.com
goldeneaglescoin.com
mayacottage.com
taekyoong.com
mahiguel.com
dramulyamullapudi.com
osaruru.com
momaustralia.com
xiaotu.gay
gokenko.com
simplywarehouses.com
jacketshops.com
pranayketineni.com
wmrnyy.icu
fmloo23.top
annadoshina.online
dhctpsp.com
jjjj88888.com
agentoto.life
siterapido.click
ursrobotics.online
sdrsg.top
buzzatbuzz.com
hzliping.com
susanwolff.com
mikexkwt9sd.com
fdd7021.com
taltusinvestimentos.com
tommilye.com
cartoonteeshood.com
loginputra.xyz
digibyten.com
qjzg607.com
scxf.xyz
dfkld.fun
gyaantree.com
icarepassport.com
netflixmirorr.com
buyfirstratefinds.com
rosaebody.com
kavabarsforsale.com
nudeaunts.com
shjmele.com
351660.com
masukslotgacor.top
calcium2049.pro
boldshop1.click
early-lung-cancer-signs.bond
zibloo.com
dafacoins.com
lotte-finance.icu
betaverse204.com
surptb.xyz
5stargeneralcontractor.net
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2640-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2640-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2720-23-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2720-25-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2920 set thread context of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2640 set thread context of 1260 2640 InstallUtil.exe 13 PID 2720 set thread context of 1260 2720 ipconfig.exe 13 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2720 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 2640 InstallUtil.exe 2640 InstallUtil.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe 2720 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2640 InstallUtil.exe 2640 InstallUtil.exe 2640 InstallUtil.exe 2720 ipconfig.exe 2720 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe Token: SeDebugPrivilege 2640 InstallUtil.exe Token: SeDebugPrivilege 2720 ipconfig.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1260 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 2920 wrote to memory of 2640 2920 514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe 28 PID 1260 wrote to memory of 2720 1260 Explorer.EXE 29 PID 1260 wrote to memory of 2720 1260 Explorer.EXE 29 PID 1260 wrote to memory of 2720 1260 Explorer.EXE 29 PID 1260 wrote to memory of 2720 1260 Explorer.EXE 29 PID 2720 wrote to memory of 2592 2720 ipconfig.exe 30 PID 2720 wrote to memory of 2592 2720 ipconfig.exe 30 PID 2720 wrote to memory of 2592 2720 ipconfig.exe 30 PID 2720 wrote to memory of 2592 2720 ipconfig.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe"C:\Users\Admin\AppData\Local\Temp\514797a6bc29a3576aab268de1a8fed7df7adba5f77c4b7f6c8d91c1567d9339.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:2592
-
-