Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
FLY.exe
Resource
win7-20231020-en
General
-
Target
FLY.exe
-
Size
575KB
-
MD5
d400c125c91f0da96b71a1335d5c7e9e
-
SHA1
c5cadd640c60cc5ae5377fa8726c15f38808a131
-
SHA256
6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7db
-
SHA512
8d77dc100e939fd72e3036307883584af47c35298e049fbc3c92cfb94c4a782180ff0a5c5148d72e4f2e39d6208c9237f65b1f6488e5bfa31cca5c30c0ffbf2f
-
SSDEEP
12288:nE+RIimQdL6iHOHpF2hJwy+atu6KVC94MVK4ENzZK:nE+evGOHpKavI4YEN
Malware Config
Extracted
formbook
4.1
cc73
viptop77.biz
sell-home-fast-for-cash.xyz
wjbwebsite.top
ceramic.house
anthologymotors.com
acctwiseconsulting.com
xn--bj4blri6mqqan64b.com
roguester.com
blavkimped.com
mostbet-wih8.xyz
biellacapital.com
jasonmoorehead.online
wolrdtenis.com
huahuiblog.com
jonniprince.com
gohanyo.com
l4-j2.pro
coinyeard.com
fh8019.com
iltorlonia.com
themobilefinder.com
taipush.com
qlw3wm.top
akersbusinesslaw.com
imluodiyue.com
niok-blase.top
palmettobaynews.com
brothers-style.com
zg9tywlubmftzw5ldze3njm.com
amihad.company
zaymnokpo.online
rabbit-tantei.site
oncologyphotos.com
aqdydep.com
kt8mx41vvk0gp4f.xyz
bushypussypi.com
kishanobd.com
amazonva.info
poker-dewa88.com
exhibit-t.com
10923.top
doneforyouph.com
topantisnoringdevice.com
gwf952.com
hjnnhhyyu.com
120bahis1000.com
niloticus.com
spitzpr-fu.info
3gmosoft.com
datalinkstore.com
crossidea.net
qplezamczb.com
h3b8c.com
wtjtv5.cyou
tizusano.com
audreydeshetler.com
deutschebankcredits.com
tanpabatas16.click
amegjenerator.com
smnrx.com
hh-brilliance.com
bixas.xyz
krebls.com
pharmacogeneticsreviews.com
ribbon-555.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/1144-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1144-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1144-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4768-25-0x00000000003B0000-0x00000000003DF000-memory.dmp formbook behavioral2/memory/4768-27-0x00000000003B0000-0x00000000003DF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4624 set thread context of 1144 4624 FLY.exe 95 PID 1144 set thread context of 3192 1144 FLY.exe 56 PID 1144 set thread context of 3192 1144 FLY.exe 56 PID 4768 set thread context of 3192 4768 cmstp.exe 56 -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4624 FLY.exe 4624 FLY.exe 4624 FLY.exe 4624 FLY.exe 1144 FLY.exe 1144 FLY.exe 1144 FLY.exe 1144 FLY.exe 1144 FLY.exe 1144 FLY.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe 4768 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3192 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1144 FLY.exe 1144 FLY.exe 1144 FLY.exe 1144 FLY.exe 4768 cmstp.exe 4768 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4624 FLY.exe Token: SeDebugPrivilege 1144 FLY.exe Token: SeDebugPrivilege 4768 cmstp.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3192 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4624 wrote to memory of 792 4624 FLY.exe 93 PID 4624 wrote to memory of 792 4624 FLY.exe 93 PID 4624 wrote to memory of 792 4624 FLY.exe 93 PID 4624 wrote to memory of 2552 4624 FLY.exe 94 PID 4624 wrote to memory of 2552 4624 FLY.exe 94 PID 4624 wrote to memory of 2552 4624 FLY.exe 94 PID 4624 wrote to memory of 1144 4624 FLY.exe 95 PID 4624 wrote to memory of 1144 4624 FLY.exe 95 PID 4624 wrote to memory of 1144 4624 FLY.exe 95 PID 4624 wrote to memory of 1144 4624 FLY.exe 95 PID 4624 wrote to memory of 1144 4624 FLY.exe 95 PID 4624 wrote to memory of 1144 4624 FLY.exe 95 PID 3192 wrote to memory of 4768 3192 Explorer.EXE 97 PID 3192 wrote to memory of 4768 3192 Explorer.EXE 97 PID 3192 wrote to memory of 4768 3192 Explorer.EXE 97 PID 4768 wrote to memory of 2332 4768 cmstp.exe 99 PID 4768 wrote to memory of 2332 4768 cmstp.exe 99 PID 4768 wrote to memory of 2332 4768 cmstp.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\FLY.exe"C:\Users\Admin\AppData\Local\Temp\FLY.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\FLY.exe"C:\Users\Admin\AppData\Local\Temp\FLY.exe"3⤵PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\FLY.exe"C:\Users\Admin\AppData\Local\Temp\FLY.exe"3⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\FLY.exe"C:\Users\Admin\AppData\Local\Temp\FLY.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1976
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FLY.exe"3⤵PID:2332
-
-