Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
b643c1dfbcea7629e8d7a9d64c4779a6.exe
Resource
win7-20240221-en
General
-
Target
b643c1dfbcea7629e8d7a9d64c4779a6.exe
-
Size
1.4MB
-
MD5
b643c1dfbcea7629e8d7a9d64c4779a6
-
SHA1
02addb137f4407dc05af7d862b2533b131733f59
-
SHA256
f6bb8018c90c49a3b09ad5b94cbfe5009b59abdee04d05be8f4ae8825f71cf19
-
SHA512
0a08c959b9a51c558cfa031a14efb2eaf880e7a632341303d30199f0a68ce36b7a8ea1d802244eeca8fdee3c34352c70e121d5e860be68ebb7356cabae6f0e1c
-
SSDEEP
12288:b6SgaIMVjLz7T8BiOcef3gVZsZZZsZbesbZYhZ8bfVe0S+dkl/WsiH42mHNClsrJ:AiOmeB4ftdCbt/QS5JNuBaP2nvm
Malware Config
Extracted
formbook
4.1
nmda
studiovelicham.com
minskpost.com
bakolytu.com
getbeautyshot.com
staabonlinechoice.com
ezulink.com
allbrandsmoto.com
expertdentalpro.com
grossmasterbalon.art
edutatega.com
salsasuarez.com
goodcopsbadcopsstore.com
stephanityrance.com
allgoodescrows.com
lotus-attari.com
chiselandgrit.com
herbalbooze.com
colossalpublicspeaking.com
summitcreators.com
exgateway.com
foreverandadayphoto.com
2guysicecream.com
eh-consultancy.com
purkid.com
xn--rhqu62d11jfsb.com
planet-eureka.com
the-aerial.com
picardmeme.com
1776philly.com
harrisfoodbar.com
bookbeachbeds.com
streamsandvariations.com
emirathu.net
almasagradaart.com
bitz-solutions.com
thedemocratads.com
smacey.com
argus7.com
musicaltheatrestream.com
kamaruza.com
topnewson.com
fragha.com
bukulah.com
78500863.xyz
baidukuangjiahu.com
itazcbu.com
butterflyhandcraftedjewelry.com
pixelnewsimages.com
naturklinik.online
sbsafety.net
669waverly.com
elegancelamp.com
patienteses.com
ph-studio.site
correctlightingstore.com
mataevnadlan.com
pittsburghshometowncasino.com
conchargeback.com
impresafree24.com
creatorscalculator.com
grprpclass.com
pingreenhouse.com
soondoock.com
forgeflare.com
pushorder.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2880-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2880 b643c1dfbcea7629e8d7a9d64c4779a6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29 PID 2200 wrote to memory of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29 PID 2200 wrote to memory of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29 PID 2200 wrote to memory of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29 PID 2200 wrote to memory of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29 PID 2200 wrote to memory of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29 PID 2200 wrote to memory of 2880 2200 b643c1dfbcea7629e8d7a9d64c4779a6.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b643c1dfbcea7629e8d7a9d64c4779a6.exe"C:\Users\Admin\AppData\Local\Temp\b643c1dfbcea7629e8d7a9d64c4779a6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\b643c1dfbcea7629e8d7a9d64c4779a6.exe"C:\Users\Admin\AppData\Local\Temp\b643c1dfbcea7629e8d7a9d64c4779a6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-