Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
M5q4uWVi2hHJb5C.exe
Resource
win7-20231215-en
General
-
Target
M5q4uWVi2hHJb5C.exe
-
Size
673KB
-
MD5
8f59922b722f3d9687be6fbe7560a62e
-
SHA1
8fa58ece4679a1583f3f63ad1e7584ddae114e02
-
SHA256
2cf38bc5d5c1fea2c057ec48c472636028f113bea556386f0cc8b785a3a21189
-
SHA512
118ed74e6d2b0377d0d32366315b3fae260d6bdc5b10b1eaad6c8747a153844a1bec55bca194411e70db71251c5324aa69a0c5133e32cb1440107c5d9afb12e9
-
SSDEEP
12288:8CxEd61QEWfBQYahsa5cJQAmaNzzePkzYa3Y2fTKQ+KWr:8CxcvfByhsa5+OKzzhZZ7L+pr
Malware Config
Extracted
formbook
4.1
cz30
valeriepuma.com
rentyourbag.com
unglesbyessure.com
ahzmjy.site
taazdelights.online
conexoesnews.com
istprimeway.com
elwf4tlu.shop
661.support
fournaisehk.com
glechiu.xyz
2r2pv2.shop
902523.rip
bruggicapy.com
westmobileautodeatailers.online
muaad.co
gridxsens.com
victoronedesigns.com
tecexpressbr.com
crea4net.com
ibtamarketing.com
slot-777.bet
directoriokansascity.com
izmirdeumitvar.com
gkw92121aej.com
ariseclo.com
amyandkellywedding.com
acuservsolutions.co
autaxmygov.life
ekbredyc.top
80121.club
alicejoppa.com
fitnatil.shop
414545.top
exirdaru.com
aiprofitslive.com
boatnirvanalife.com
wolfieknorway.com
paperwork-jakarta.com
uae535.com
ardunino.com
ovisuregoldthai.xyz
graceandgratitude.shop
zz35782.com
ozuguler.com
determinado-procon.site
s22jlurtjw.biz
edmotus.com
poolhousesupply.com
mineralsandminingme.com
maxgamingwoods.com
genclerkonagi.com
sanjaycabs.com
kyzerfilms.com
miujamconstruction.com
urbanecom.in
doraldentalstudiobook.com
klasku.store
drgderigo.com
zipang.xyz
artbyvisn.com
worldofperfumes.us
ntxd.life
teeleads.com
angpaogenit77.store
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2792-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2792-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2792-22-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2972-28-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2972-30-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1212 set thread context of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 2792 set thread context of 1228 2792 M5q4uWVi2hHJb5C.exe 18 PID 2792 set thread context of 1228 2792 M5q4uWVi2hHJb5C.exe 18 PID 2972 set thread context of 1228 2972 svchost.exe 18 -
description ioc Process Key created \Registry\User\S-1-5-21-452311807-3713411997-1028535425-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2792 M5q4uWVi2hHJb5C.exe 2792 M5q4uWVi2hHJb5C.exe 2792 M5q4uWVi2hHJb5C.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2792 M5q4uWVi2hHJb5C.exe 2792 M5q4uWVi2hHJb5C.exe 2792 M5q4uWVi2hHJb5C.exe 2792 M5q4uWVi2hHJb5C.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe 2972 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2792 M5q4uWVi2hHJb5C.exe Token: SeDebugPrivilege 2972 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 1212 wrote to memory of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 1212 wrote to memory of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 1212 wrote to memory of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 1212 wrote to memory of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 1212 wrote to memory of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 1212 wrote to memory of 2792 1212 M5q4uWVi2hHJb5C.exe 28 PID 1228 wrote to memory of 2972 1228 Explorer.EXE 30 PID 1228 wrote to memory of 2972 1228 Explorer.EXE 30 PID 1228 wrote to memory of 2972 1228 Explorer.EXE 30 PID 1228 wrote to memory of 2972 1228 Explorer.EXE 30 PID 2972 wrote to memory of 884 2972 svchost.exe 34 PID 2972 wrote to memory of 884 2972 svchost.exe 34 PID 2972 wrote to memory of 884 2972 svchost.exe 34 PID 2972 wrote to memory of 884 2972 svchost.exe 34 PID 2972 wrote to memory of 884 2972 svchost.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2780
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:884
-
-