Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe
Resource
win7-20231215-en
General
-
Target
f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe
-
Size
446KB
-
MD5
e10c2c5de1c6b8be9f4d6814930fd018
-
SHA1
9305c3478e82b8e05395c6010737b2ca50e9a026
-
SHA256
f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd
-
SHA512
f8c83a346b2e29d8915ba00fef8eaf7d15dfebaffea2ad5e9863bcac3414a224926b627c2371644e0a48ff602aede5ad4b21f2d1513e95a306a6fe2997011040
-
SSDEEP
12288:YvL8c8ld2qLqxhHe6wQfDxRvIxVvJRjs:e85OqLAHLwQbxtcVvJC
Malware Config
Extracted
formbook
4.1
rhtn
ctwlabs.com
zaimjefhi.online
janetsboutiquestore.com
srello.com
dk1380.com
thuphangahhome.com
usahealthcarenetwork.com
ostbet.com
artbacus.com
kuaitaobao.net
aeinnamehranandegi.com
glassesbestselect.com
drain-pipe-cleaning-47086.bond
beyondhorsemanship.com
cottonfuturesbook.com
fairfieldcountyb.com
worldtoronto.com
onairnepal.com
kongmad.com
host-u.com
channelswhatsapp.com
xowlkjc.com
chaoyoukj.com
sparetech.site
dskwazxc.xyz
nextradeya.net
vhow.net
75693.monster
44695384.top
cuma777asli.net
atlasappsys.com
hanhaiguojidasha.net
monthlycarrentaloffers.com
mhyyt.site
leadijer-conntect.top
75jf.lat
webmasteryhub.tech
shriaonetravels.com
zfedu.net
fingcorp.xyz
dannireading.com
pemudatogell16.com
qyyongjun.com
ambitiousoatmeal.com
ronanwright.com
nippon-ltd.com
hollandflooringllc.com
herauraglow.com
w-qgw3.link
ticksport.net
ipsir.net
czechdepanten.pro
bassconstructiontn.com
superviralteam.com
danielsperaw.net
chefclinics.com
dinocox.com
orassist.com
sclerotiniosescle.best
accutranslations.com
distribuidoraagroglobal.com
bossdogs.shop
qyj688038xlaa.top
ambulancessecours27.info
alonacp.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2252-496-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1900-511-0x0000000000F70000-0x0000000000F9F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 228 set thread context of 2252 228 f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe 95 PID 2252 set thread context of 3380 2252 calc.exe 50 PID 1900 set thread context of 3380 1900 msiexec.exe 50 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2252 calc.exe 2252 calc.exe 2252 calc.exe 2252 calc.exe 2252 calc.exe 2252 calc.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe 1900 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2252 calc.exe 2252 calc.exe 2252 calc.exe 1900 msiexec.exe 1900 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2252 calc.exe Token: SeDebugPrivilege 1900 msiexec.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3380 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 228 wrote to memory of 2252 228 f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe 95 PID 228 wrote to memory of 2252 228 f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe 95 PID 228 wrote to memory of 2252 228 f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe 95 PID 228 wrote to memory of 2252 228 f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe 95 PID 228 wrote to memory of 2252 228 f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe 95 PID 228 wrote to memory of 2252 228 f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe 95 PID 3380 wrote to memory of 1900 3380 Explorer.EXE 96 PID 3380 wrote to memory of 1900 3380 Explorer.EXE 96 PID 3380 wrote to memory of 1900 3380 Explorer.EXE 96 PID 1900 wrote to memory of 3952 1900 msiexec.exe 99 PID 1900 wrote to memory of 3952 1900 msiexec.exe 99 PID 1900 wrote to memory of 3952 1900 msiexec.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe"C:\Users\Admin\AppData\Local\Temp\f90db97e56f2eb46d2e55a0cd7674997bbc2d644f6370b477fd04edfca7b9cdd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SYSWOW64\calc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\calc.exe"3⤵PID:3952
-
-