Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
BBK987866767899.exe
Resource
win7-20231129-en
General
-
Target
BBK987866767899.exe
-
Size
792KB
-
MD5
6f5d737532ce8f20246b98b439168fc4
-
SHA1
f2066b5bc181c2e5788a23c5b335f2045a5c4d07
-
SHA256
ec7f9e26c253ba9024ad8baf255778a3ee3055cc0f834be9e77a41e80d49e9e0
-
SHA512
2bd40442fc05779e767ae5f65e9a5234b447dc33d0509790ca540a04deadf059bc3bab7e09ddfa41bd37388c721aa90b596444a421665c9e5fd73a76259276bc
-
SSDEEP
12288:zt0r6klnaP5oE/kbQRgp16XR0oBtFR7ke+Dp:z6r6mHTbSw16XTffkZp
Malware Config
Extracted
formbook
4.1
he2a
connectioncompass.store
zekicharge.com
dp77.shop
guninfo.guru
mamaeconomics.net
narcisme.coach
redtopassociates.com
ezezn.com
theoregondog.com
pagosmultired.online
emsculptcenterofne.com
meet-friends.online
pf326.com
wealthjigsaw.xyz
arsajib.com
kickassholdings.online
avaturre.biz
dtslogs.com
lb92.tech
pittalam.com
cyberlegion.group
24eu-ru-startup.xyz
theaustralianbrisketboard.com
bavrnimn.site
xn--groupe-gorg-lbb.com
hg08139.com
myjbtest.net
cyg8wm3zfb.xyz
mimi2023.monster
ruixiangg.com
smokintires.net
out-boundlabs.net
matrix-promotions.com
botfolk.com
6o20r.beauty
cpohlelaw.com
zamupoi.fun
eletrobrasilvendas.com
desire-dating.com
678ap.com
bioprost.club
hfaer4.xyz
yuwangjing.com
359brigham.com
misstamar.mobi
lucasbrownviolinstudio.com
mybet668.com
giuila.online
mathews.buzz
dcmdot.com
epeople.store
totneshotdesk.com
jaehub.com
notbokin.online
trongiv.xyz
adept-expert-comptable.net
4tvaccounting.com
saledotfate.live
canadiantrafficmanagement.net
oktravelhi.com
taylorranchtrail.com
tempahwebsites.com
b-store.shop
paintellensburg.com
qfs-capital.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2080-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2080-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3408-21-0x0000000000600000-0x000000000062F000-memory.dmp formbook behavioral2/memory/3408-23-0x0000000000600000-0x000000000062F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3388 set thread context of 2080 3388 BBK987866767899.exe 96 PID 2080 set thread context of 3436 2080 BBK987866767899.exe 42 PID 3408 set thread context of 3436 3408 cmstp.exe 42 -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3388 BBK987866767899.exe 3388 BBK987866767899.exe 2080 BBK987866767899.exe 2080 BBK987866767899.exe 2080 BBK987866767899.exe 2080 BBK987866767899.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe 3408 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2080 BBK987866767899.exe 2080 BBK987866767899.exe 2080 BBK987866767899.exe 3408 cmstp.exe 3408 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3388 BBK987866767899.exe Token: SeDebugPrivilege 2080 BBK987866767899.exe Token: SeDebugPrivilege 3408 cmstp.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4676 3388 BBK987866767899.exe 95 PID 3388 wrote to memory of 4676 3388 BBK987866767899.exe 95 PID 3388 wrote to memory of 4676 3388 BBK987866767899.exe 95 PID 3388 wrote to memory of 2080 3388 BBK987866767899.exe 96 PID 3388 wrote to memory of 2080 3388 BBK987866767899.exe 96 PID 3388 wrote to memory of 2080 3388 BBK987866767899.exe 96 PID 3388 wrote to memory of 2080 3388 BBK987866767899.exe 96 PID 3388 wrote to memory of 2080 3388 BBK987866767899.exe 96 PID 3388 wrote to memory of 2080 3388 BBK987866767899.exe 96 PID 3436 wrote to memory of 3408 3436 Explorer.EXE 97 PID 3436 wrote to memory of 3408 3436 Explorer.EXE 97 PID 3436 wrote to memory of 3408 3436 Explorer.EXE 97 PID 3408 wrote to memory of 3684 3408 cmstp.exe 99 PID 3408 wrote to memory of 3684 3408 cmstp.exe 99 PID 3408 wrote to memory of 3684 3408 cmstp.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\BBK987866767899.exe"C:\Users\Admin\AppData\Local\Temp\BBK987866767899.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\BBK987866767899.exe"C:\Users\Admin\AppData\Local\Temp\BBK987866767899.exe"2⤵PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\BBK987866767899.exe"C:\Users\Admin\AppData\Local\Temp\BBK987866767899.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BBK987866767899.exe"3⤵PID:3684
-
-