Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
5b5276e6117204297cf817fee27e16d4.exe
Resource
win7-20231215-en
General
-
Target
5b5276e6117204297cf817fee27e16d4.exe
-
Size
651KB
-
MD5
5b5276e6117204297cf817fee27e16d4
-
SHA1
085f8c31af7217eaa95ddcab32ec8de22f3e93e0
-
SHA256
4c5fd4ed6d7eda044f08d5369dd3ac130ae1e7d2f8415a77ebbc8010e2fe7c11
-
SHA512
dbb25c6f0faf121f3d0d23a2c69e16c8463d8b842124b2f5ebb5a8ef037d412ce812d3ec26d4790d771cabf1b68ccae90ae75451a9758ae1eeac7e9eed03733e
-
SSDEEP
12288:xIGmwPTWN5FyYLX8kQMHbNJYYzTsBJqgh:Gw7WN5Frj2M7NBfy
Malware Config
Extracted
formbook
4.1
gz92
ayurvedichealthformulas.com
plazaconstrutora.com
nat-hetong.info
eapdigital.com
ibluebaytvwdshop.com
committable.com
escapesbyek.com
mywebdesigner.pro
jianianhong.com
benvenutoqui.com
beiyet.com
theartofgifs.com
mbwvyksnk.icu
nshahwelfare.com
hhhservice.com
thechaibali.com
travelscreen.expert
best123-movies.com
leiahin.com
runplay11.com
oorulyh.icu
mypatchworkfamily.com
twerkwhileyouworkplanners.com
bradentonroofwashing.com
donandy.com
lonewolfchad.com
celsisenergy.net
humanweed.com
rosybakery.com
cookinwithsugarlious.com
1s5dnwzwv8tht8vi0v78kde4e.com
heyshopy.com
chibiaegyoshop.com
neverbrokerage.com
theadventurebench.com
psicologiapaula.com
xinke518.com
re-change.net
prodj-gear.com
iamworldwideshop.com
onlinemusiclessons.info
yxsc576.com
staniselevators.com
goldenleashcanine.com
luxormedikal.com
protectcentralcoast.com
jaysfinefood.com
zeneanyasbyerika.com
t-algorithm.net
busty-italian.com
bestlawnkzoo.com
bakeology.store
assured-justice-nl.com
sexf5.com
liveyourmaverick.com
mkt10697.com
suxfi.com
cardiociencia.net
truetoselfclothing.com
mcgrudersfitness.com
savorfullpoints.com
naturesblendsupplements.com
eseskalierteh.com
netechsupport.com
peggeorge.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4212-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3796 set thread context of 4212 3796 5b5276e6117204297cf817fee27e16d4.exe 102 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3796 5b5276e6117204297cf817fee27e16d4.exe 3796 5b5276e6117204297cf817fee27e16d4.exe 3796 5b5276e6117204297cf817fee27e16d4.exe 3796 5b5276e6117204297cf817fee27e16d4.exe 4212 5b5276e6117204297cf817fee27e16d4.exe 4212 5b5276e6117204297cf817fee27e16d4.exe 4212 5b5276e6117204297cf817fee27e16d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3796 5b5276e6117204297cf817fee27e16d4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3796 wrote to memory of 3472 3796 5b5276e6117204297cf817fee27e16d4.exe 101 PID 3796 wrote to memory of 3472 3796 5b5276e6117204297cf817fee27e16d4.exe 101 PID 3796 wrote to memory of 3472 3796 5b5276e6117204297cf817fee27e16d4.exe 101 PID 3796 wrote to memory of 3444 3796 5b5276e6117204297cf817fee27e16d4.exe 103 PID 3796 wrote to memory of 3444 3796 5b5276e6117204297cf817fee27e16d4.exe 103 PID 3796 wrote to memory of 3444 3796 5b5276e6117204297cf817fee27e16d4.exe 103 PID 3796 wrote to memory of 4212 3796 5b5276e6117204297cf817fee27e16d4.exe 102 PID 3796 wrote to memory of 4212 3796 5b5276e6117204297cf817fee27e16d4.exe 102 PID 3796 wrote to memory of 4212 3796 5b5276e6117204297cf817fee27e16d4.exe 102 PID 3796 wrote to memory of 4212 3796 5b5276e6117204297cf817fee27e16d4.exe 102 PID 3796 wrote to memory of 4212 3796 5b5276e6117204297cf817fee27e16d4.exe 102 PID 3796 wrote to memory of 4212 3796 5b5276e6117204297cf817fee27e16d4.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"2⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"C:\Users\Admin\AppData\Local\Temp\5b5276e6117204297cf817fee27e16d4.exe"2⤵PID:3444
-