Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
JJUmnnkIxSCyKik.exe
Resource
win7-20240215-en
General
-
Target
JJUmnnkIxSCyKik.exe
-
Size
778KB
-
MD5
d3276b14eaab222d13f7f15dc879ed16
-
SHA1
8d5809ae7176e28e61245b18678ef3bada66f414
-
SHA256
864b5669f18681ae03edbd7c3b3bbf6732e55191d4883f18783eb9c611fa9a17
-
SHA512
9a552073cb2f81f6b623f20bc388a68a1c1e5fe79198ae5c59a9548e5228db408e263bc3f57ac8a915e7971df41be5a1f6588b225ac5fdf6500bb5f58086ac52
-
SSDEEP
24576:AHPjKr5BNDoxwj4R0zyfx+VC6vkI8F4WSI+y9:6k5BNYSNq6vcI8FQW
Malware Config
Extracted
formbook
4.1
be03
458q14v4ams2.com
priceoctopus.com
betinplay.xyz
bcnd.xyz
1510soliveavenue.com
mcdpropertypros.com
reddcrownexpress.com
rewardlabs.shop
burenbrand.com
revand.io
tractionendurancecoaching.com
jotaerreshopp.com
shopboyg.com
dakor.shop
groundswellmag.life
nehagadodia.com
dancarellibizbroker.com
meconline.co
ttmq.cc
thegoldenyouph.com
poolcenter.store
portalesexpress.com
okltyf.xyz
wnkj001.site
wltk.site
nexosmedic.com
cartell.app
yteam.tech
gpt-toolbox.io
plexirecruiters.com
beerattraction.com
11111bet365.com
24laura.info
stupididiotmoron.com
test-igot.com
gramotnosti.store
truck-driver-jobs-2024.online
fundedxprop.com
xpendly.cc
mobtruecrime.com
3051harborview.com
6891ybfh.xyz
growthpfad.com
sygtrainings.com
fastgrowthleads.com
kiwiceleste.store
fidesinvicta.com
oneupmushroom.store
socialsellingbootcamp.com
dy-gmvrp.xyz
d3cargo.com
6ixsoft.com
fengyuncq.com
stmerry888.com
yahliker.online
numoneypro.com
jadediver.com
lauvhoney.com
oirdesign.com
robobussy.com
healthstartsinyour20s.com
roofing-jobs4-in-205nz.today
alexisfennillustration.com
abandoned-houses-se-0.bond
j88.kids
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2568-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2568-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
Processes:
JJUmnnkIxSCyKik.exeJJUmnnkIxSCyKik.exedescription pid process target process PID 2220 set thread context of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 2568 set thread context of 1116 2568 JJUmnnkIxSCyKik.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2640 2920 WerFault.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
JJUmnnkIxSCyKik.exepid process 2568 JJUmnnkIxSCyKik.exe 2568 JJUmnnkIxSCyKik.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
JJUmnnkIxSCyKik.exepid process 2568 JJUmnnkIxSCyKik.exe 2568 JJUmnnkIxSCyKik.exe 2568 JJUmnnkIxSCyKik.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
JJUmnnkIxSCyKik.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2568 JJUmnnkIxSCyKik.exe Token: SeShutdownPrivilege 1116 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
JJUmnnkIxSCyKik.exeExplorer.EXEmsiexec.exedescription pid process target process PID 2220 wrote to memory of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 2220 wrote to memory of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 2220 wrote to memory of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 2220 wrote to memory of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 2220 wrote to memory of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 2220 wrote to memory of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 2220 wrote to memory of 2568 2220 JJUmnnkIxSCyKik.exe JJUmnnkIxSCyKik.exe PID 1116 wrote to memory of 2920 1116 Explorer.EXE msiexec.exe PID 1116 wrote to memory of 2920 1116 Explorer.EXE msiexec.exe PID 1116 wrote to memory of 2920 1116 Explorer.EXE msiexec.exe PID 1116 wrote to memory of 2920 1116 Explorer.EXE msiexec.exe PID 1116 wrote to memory of 2920 1116 Explorer.EXE msiexec.exe PID 1116 wrote to memory of 2920 1116 Explorer.EXE msiexec.exe PID 1116 wrote to memory of 2920 1116 Explorer.EXE msiexec.exe PID 2920 wrote to memory of 2640 2920 msiexec.exe WerFault.exe PID 2920 wrote to memory of 2640 2920 msiexec.exe WerFault.exe PID 2920 wrote to memory of 2640 2920 msiexec.exe WerFault.exe PID 2920 wrote to memory of 2640 2920 msiexec.exe WerFault.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\JJUmnnkIxSCyKik.exe"C:\Users\Admin\AppData\Local\Temp\JJUmnnkIxSCyKik.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\JJUmnnkIxSCyKik.exe"C:\Users\Admin\AppData\Local\Temp\JJUmnnkIxSCyKik.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 2683⤵
- Program crash
PID:2640