Analysis Overview
SHA256
f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9
Threat Level: Known bad
The file f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe was found to be: Known bad.
Malicious Activity Summary
Formbook
Formbook payload
Suspicious use of SetThreadContext
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-05-09 05:21
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-09 05:21
Reported
2024-05-09 05:23
Platform
win10v2004-20240426-en
Max time kernel
98s
Max time network
99s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4904 set thread context of 4408 | N/A | C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe | C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe
"C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe"
C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe
"C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe"
C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe
"C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe"
C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe
"C:\Users\Admin\AppData\Local\Temp\f23b020b5a3aab42525b80bef3474df287cc7fa80dc3c13229c571e32fb99fe9.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
Files
memory/4904-0-0x000000007468E000-0x000000007468F000-memory.dmp
memory/4904-1-0x0000000000160000-0x000000000020A000-memory.dmp
memory/4904-2-0x0000000005170000-0x0000000005714000-memory.dmp
memory/4904-3-0x0000000004C60000-0x0000000004CF2000-memory.dmp
memory/4904-4-0x0000000004C10000-0x0000000004C1A000-memory.dmp
memory/4904-5-0x0000000004F40000-0x0000000004FDC000-memory.dmp
memory/4904-6-0x0000000074680000-0x0000000074E30000-memory.dmp
memory/4904-7-0x0000000004F10000-0x0000000004F2C000-memory.dmp
memory/4904-8-0x00000000050F0000-0x00000000050FE000-memory.dmp
memory/4904-9-0x0000000005120000-0x0000000005136000-memory.dmp
memory/4904-10-0x0000000006240000-0x00000000062B6000-memory.dmp
memory/4408-11-0x0000000000400000-0x000000000042F000-memory.dmp
memory/4904-13-0x0000000074680000-0x0000000074E30000-memory.dmp
memory/4408-14-0x0000000001360000-0x00000000016AA000-memory.dmp