Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
yPURXYpFVuXra2o.exe
Resource
win7-20240508-en
General
-
Target
yPURXYpFVuXra2o.exe
-
Size
795KB
-
MD5
6c73961037087d34597fc8a582388bcc
-
SHA1
fc96081d921b7f82b9c559ffc335b02364199fd7
-
SHA256
93815b97bf6c09abc9e705096381dd25b658853e0751f7b95cc51123c251bcf2
-
SHA512
140b6064ecd453809a8a4a8d0fc1f2c82644fa53324c1d1995d4399f7d4f7db14d22dd6cdd9218c17d3d093e5be84667b0ed8f25690d1add9a3e43aa286536ce
-
SSDEEP
24576:zMYeWygN5iwSC6OJCa0jIOGFmGJlNmvcu:zMYeqN5idN6X0jvARNmUu
Malware Config
Extracted
formbook
4.1
cr12
nff1291.com
satyainfra.com
hechiceradeamores.com
jfgminimalist.com
qut68q.com
pedandmore.com
sugardefender24-usa.us
somalse.com
lotusluxecandle.com
certificadobassetpro.com
veryaroma.com
thehistoryofindia.in
33155.cc
terastudy.net
84031.vip
heilsambegegnen.com
horizon-rg.info
junongpei.website
winstons.club
henslotalt.us
home-care-72875.bond
elmetaversal.com
thetrendingproduct.com
kiki-hello-jury.com
fertami.info
free-cell-phones-en-arena.sbs
emilogiska.com
airexam.in
masters-of-1.com
othersidings.com
fullpaw.com
xmmtrader.com
astronomersparadise.net
cert.agency
pools-97641.bond
forexsignals-trading.com
bxsmediaconsulting.com
perfectedskincare.com
footresort.com
warehouse-inventory-80963.bond
purifygenius.com
bolinkpass.club
velleclub.com
epuar.com
winningpickleballshots.com
spiaggia.club
kadinzuri.com
keyboards-280323.cfd
africanfemalefounders.club
tkoelectriical.com
wg5688.com
properrr.com
fortune-tiger-rede.com
65302.vip
psychologyzerodegrees.today
top99bet4d.site
priuswuxi.com
carneden.com
ptwix.xyz
furniture-70925.bond
064817.com
ferradaoffroad.com
pix2click.life
jurj.xyz
spiritualpath.info
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2588-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2588-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3292-24-0x0000000000C40000-0x0000000000C6F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
yPURXYpFVuXra2o.exeyPURXYpFVuXra2o.exenetsh.exedescription pid process target process PID 4476 set thread context of 2588 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 2588 set thread context of 3604 2588 yPURXYpFVuXra2o.exe Explorer.EXE PID 3292 set thread context of 3604 3292 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
yPURXYpFVuXra2o.exeyPURXYpFVuXra2o.exenetsh.exepid process 4476 yPURXYpFVuXra2o.exe 4476 yPURXYpFVuXra2o.exe 4476 yPURXYpFVuXra2o.exe 4476 yPURXYpFVuXra2o.exe 2588 yPURXYpFVuXra2o.exe 2588 yPURXYpFVuXra2o.exe 2588 yPURXYpFVuXra2o.exe 2588 yPURXYpFVuXra2o.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe 3292 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
yPURXYpFVuXra2o.exenetsh.exepid process 2588 yPURXYpFVuXra2o.exe 2588 yPURXYpFVuXra2o.exe 2588 yPURXYpFVuXra2o.exe 3292 netsh.exe 3292 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
yPURXYpFVuXra2o.exeyPURXYpFVuXra2o.exenetsh.exedescription pid process Token: SeDebugPrivilege 4476 yPURXYpFVuXra2o.exe Token: SeDebugPrivilege 2588 yPURXYpFVuXra2o.exe Token: SeDebugPrivilege 3292 netsh.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3604 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
yPURXYpFVuXra2o.exeExplorer.EXEnetsh.exedescription pid process target process PID 4476 wrote to memory of 4848 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 4848 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 4848 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2568 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2568 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2568 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2588 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2588 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2588 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2588 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2588 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 4476 wrote to memory of 2588 4476 yPURXYpFVuXra2o.exe yPURXYpFVuXra2o.exe PID 3604 wrote to memory of 3292 3604 Explorer.EXE netsh.exe PID 3604 wrote to memory of 3292 3604 Explorer.EXE netsh.exe PID 3604 wrote to memory of 3292 3604 Explorer.EXE netsh.exe PID 3292 wrote to memory of 1356 3292 netsh.exe cmd.exe PID 3292 wrote to memory of 1356 3292 netsh.exe cmd.exe PID 3292 wrote to memory of 1356 3292 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"3⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"3⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\yPURXYpFVuXra2o.exe"3⤵PID:1356
-
-