Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
b123.exe
Resource
win7-20231129-en
General
-
Target
b123.exe
-
Size
227KB
-
MD5
b3104364708fa64e5242cbe54885ec56
-
SHA1
4be2064313b2f72e472b8a81797e7b14a5b3aec8
-
SHA256
f4abecbd1a56abc36103d0595086bfd31c50f33236b9431b53860e5c1e20c2a7
-
SHA512
2aa6da2a189de20c9ce5d919fc6fe8e5f050151721cf496fa93f8862dcb6775d1b5f90b5666fb01659265721b81ed788e4b938961d8166d0c09245f75f8d2591
-
SSDEEP
6144:2wVqCOiGWu2dw9r6bDo78j+JEwh3pc8aMxfcPbwoP:2KyWhw9x8spc7MiPbwoP
Malware Config
Extracted
formbook
4.1
lt0h
originalindigofurniture.co.uk
fl6588.com
acecademy.com
yaerofinerindalnalising.com
mendilovic.online
rishenght.com
famlees.com
myhomeofficemarket.com
bouquetarabia.com
chrisbani.com
freebandslegally.com
hernandezinsurancegroup.net
slicedandfresh.com
apnathikanas.com
chadhatesyou.com
ansilsas.com
in3development.com
nitiren.net
peespn.com
valengz.com
theseakelpcompany.com
tlcrentny.com
sancakcraft.com
kamenb.com
samanthajobenson.com
alphagearz.com
sprins.net
adestramentos.com
civoconstruction.com
masrmasr.com
jagrit.codes
zusammenurlaub.com
mssjqs.com
ic695niu001.com
anelimplus.com
mutlob.com
beyondmickey.net
sliever.club
perfumefashion.icu
massimilianogiannocco.com
dentoncountyattorneys.media
filigreefilly.com
mooremgmtandcompany.com
smpdj.com
stainlesspropmgmt.com
creativecollectivecommunity.com
dmdrogist.com
spokenandheardpodcast.com
garenbid.com
bestcomandcalls.space
tairunshihua.com
nemski-projekt.com
6mum.com
portlandhemorrhoidcenter.com
platinumforsale.net
driven.plus
ontheedgeoutdoorshunting.com
manatapmasalalu.com
idscustomprinting.com
safepassagereform.com
fairop.xyz
natetacticz.com
etoys-sucks.com
rhinolabs.net
bulverderoofing.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2248-2-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2248-5-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2248-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b123.exeb123.exedescription pid process target process PID 2232 set thread context of 2248 2232 b123.exe b123.exe PID 2248 set thread context of 1336 2248 b123.exe Explorer.EXE PID 2248 set thread context of 1336 2248 b123.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2684 2612 WerFault.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
b123.exepid process 2248 b123.exe 2248 b123.exe 2248 b123.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
b123.exeb123.exepid process 2232 b123.exe 2248 b123.exe 2248 b123.exe 2248 b123.exe 2248 b123.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b123.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2248 b123.exe Token: SeShutdownPrivilege 1336 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
b123.exeExplorer.EXEmsiexec.exedescription pid process target process PID 2232 wrote to memory of 2248 2232 b123.exe b123.exe PID 2232 wrote to memory of 2248 2232 b123.exe b123.exe PID 2232 wrote to memory of 2248 2232 b123.exe b123.exe PID 2232 wrote to memory of 2248 2232 b123.exe b123.exe PID 2232 wrote to memory of 2248 2232 b123.exe b123.exe PID 1336 wrote to memory of 2612 1336 Explorer.EXE msiexec.exe PID 1336 wrote to memory of 2612 1336 Explorer.EXE msiexec.exe PID 1336 wrote to memory of 2612 1336 Explorer.EXE msiexec.exe PID 1336 wrote to memory of 2612 1336 Explorer.EXE msiexec.exe PID 1336 wrote to memory of 2612 1336 Explorer.EXE msiexec.exe PID 1336 wrote to memory of 2612 1336 Explorer.EXE msiexec.exe PID 1336 wrote to memory of 2612 1336 Explorer.EXE msiexec.exe PID 2612 wrote to memory of 2684 2612 msiexec.exe WerFault.exe PID 2612 wrote to memory of 2684 2612 msiexec.exe WerFault.exe PID 2612 wrote to memory of 2684 2612 msiexec.exe WerFault.exe PID 2612 wrote to memory of 2684 2612 msiexec.exe WerFault.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b123.exe"C:\Users\Admin\AppData\Local\Temp\b123.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b123.exe"C:\Users\Admin\AppData\Local\Temp\b123.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2683⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1336-7-0x0000000007200000-0x0000000007376000-memory.dmpFilesize
1.5MB
-
memory/1336-19-0x0000000007380000-0x0000000007453000-memory.dmpFilesize
844KB
-
memory/1336-12-0x0000000007380000-0x0000000007453000-memory.dmpFilesize
844KB
-
memory/2232-1-0x0000000000110000-0x0000000000112000-memory.dmpFilesize
8KB
-
memory/2232-0-0x0000000000010000-0x0000000000016000-memory.dmpFilesize
24KB
-
memory/2248-3-0x0000000000950000-0x0000000000C53000-memory.dmpFilesize
3.0MB
-
memory/2248-6-0x00000000001E0000-0x00000000001F4000-memory.dmpFilesize
80KB
-
memory/2248-11-0x0000000000220000-0x0000000000234000-memory.dmpFilesize
80KB
-
memory/2248-5-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2248-10-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2248-2-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2612-13-0x0000000000750000-0x0000000000764000-memory.dmpFilesize
80KB
-
memory/2612-14-0x0000000000750000-0x0000000000764000-memory.dmpFilesize
80KB
-
memory/2612-16-0x0000000000750000-0x0000000000764000-memory.dmpFilesize
80KB