Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
yiLe926pJsBgixu.exe
Resource
win7-20231129-en
General
-
Target
yiLe926pJsBgixu.exe
-
Size
648KB
-
MD5
b5c6dfe319520065564fa342e1350b9e
-
SHA1
949eecf1075c49cfbfd6bb843dcbf0436660aac2
-
SHA256
93b04d266b5fddd03311c3d22a2a37ab451a3a0c6e1a28ebc2764ee5691e3291
-
SHA512
268f3d739f7397e384a3f5e462ba56f1ee9b8208e0041c52f19eccf136b32bb80f6cfb2dd1a1f5612ad42caffa55fbe24dc1787fdb4cdfcd29dfca38b01bbadb
-
SSDEEP
12288:CPOc0ArVAW0Ez3WZY6mCYNkMx9Dsa7Qq/be:fihvF3WZYUYSMDsN
Malware Config
Extracted
formbook
4.1
cr12
nff1291.com
satyainfra.com
hechiceradeamores.com
jfgminimalist.com
qut68q.com
pedandmore.com
sugardefender24-usa.us
somalse.com
lotusluxecandle.com
certificadobassetpro.com
veryaroma.com
thehistoryofindia.in
33155.cc
terastudy.net
84031.vip
heilsambegegnen.com
horizon-rg.info
junongpei.website
winstons.club
henslotalt.us
home-care-72875.bond
elmetaversal.com
thetrendingproduct.com
kiki-hello-jury.com
fertami.info
free-cell-phones-en-arena.sbs
emilogiska.com
airexam.in
masters-of-1.com
othersidings.com
fullpaw.com
xmmtrader.com
astronomersparadise.net
cert.agency
pools-97641.bond
forexsignals-trading.com
bxsmediaconsulting.com
perfectedskincare.com
footresort.com
warehouse-inventory-80963.bond
purifygenius.com
bolinkpass.club
velleclub.com
epuar.com
winningpickleballshots.com
spiaggia.club
kadinzuri.com
keyboards-280323.cfd
africanfemalefounders.club
tkoelectriical.com
wg5688.com
properrr.com
fortune-tiger-rede.com
65302.vip
psychologyzerodegrees.today
top99bet4d.site
priuswuxi.com
carneden.com
ptwix.xyz
furniture-70925.bond
064817.com
ferradaoffroad.com
pix2click.life
jurj.xyz
spiritualpath.info
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1508-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2684-23-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2864 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
yiLe926pJsBgixu.exeyiLe926pJsBgixu.exesystray.exedescription pid process target process PID 2028 set thread context of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 1508 set thread context of 1204 1508 yiLe926pJsBgixu.exe Explorer.EXE PID 2684 set thread context of 1204 2684 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
yiLe926pJsBgixu.exesystray.exepid process 1508 yiLe926pJsBgixu.exe 1508 yiLe926pJsBgixu.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe 2684 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
yiLe926pJsBgixu.exesystray.exepid process 1508 yiLe926pJsBgixu.exe 1508 yiLe926pJsBgixu.exe 1508 yiLe926pJsBgixu.exe 2684 systray.exe 2684 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
yiLe926pJsBgixu.exesystray.exedescription pid process Token: SeDebugPrivilege 1508 yiLe926pJsBgixu.exe Token: SeDebugPrivilege 2684 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
yiLe926pJsBgixu.exeExplorer.EXEsystray.exedescription pid process target process PID 2028 wrote to memory of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 2028 wrote to memory of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 2028 wrote to memory of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 2028 wrote to memory of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 2028 wrote to memory of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 2028 wrote to memory of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 2028 wrote to memory of 1508 2028 yiLe926pJsBgixu.exe yiLe926pJsBgixu.exe PID 1204 wrote to memory of 2684 1204 Explorer.EXE systray.exe PID 1204 wrote to memory of 2684 1204 Explorer.EXE systray.exe PID 1204 wrote to memory of 2684 1204 Explorer.EXE systray.exe PID 1204 wrote to memory of 2684 1204 Explorer.EXE systray.exe PID 2684 wrote to memory of 2864 2684 systray.exe cmd.exe PID 2684 wrote to memory of 2864 2684 systray.exe cmd.exe PID 2684 wrote to memory of 2864 2684 systray.exe cmd.exe PID 2684 wrote to memory of 2864 2684 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\yiLe926pJsBgixu.exe"C:\Users\Admin\AppData\Local\Temp\yiLe926pJsBgixu.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\yiLe926pJsBgixu.exe"C:\Users\Admin\AppData\Local\Temp\yiLe926pJsBgixu.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\yiLe926pJsBgixu.exe"3⤵
- Deletes itself
PID:2864
-
-