Analysis
-
max time kernel
96s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe
Resource
win7-20240729-en
General
-
Target
fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe
-
Size
1.6MB
-
MD5
3364dc2488f8444000a9da4c6d999fc4
-
SHA1
19cf9bd0f6976d75f7738ec74d2b326edee5bdde
-
SHA256
fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4
-
SHA512
24778076f2e3fbd0ab39675bab98bd7da9feaa08e276d720da2fca252377ceb2c7b1da1b9c3b862e2acbea9b6e0c29e77e093c9cff366055d894a969545ea921
-
SSDEEP
49152:AAodtaG9kS2U84B+FLan9k5TRM9zlcVj7vdLJ7t:A/B18P7t
Malware Config
Extracted
formbook
4.1
md02
onsen1508.com
partymaxclubmen36.click
texasshelvingwarehouse.com
tiantiying.com
taxcredits-pr.com
33mgbet.com
equipoleiremnacional.com
andrewghita.com
zbbnp.xyz
englandbreaking.com
a1b5v.xyz
vizamag.com
h0lg3.rest
ux-design-courses-17184.bond
of84.top
qqkartel88v1.com
avalynkate.com
cpuk-finance.com
yeslabs.xyz
webuyandsellpa.com
barnesassetrecovery.store
hecxion.xyz
theopencomputeproject.net
breezyvw.christmas
mumazyl.com
woby.xyz
jalaios10.vip
lynxpire.com
sparkbpo.com
333689z.com
rslotrank.win
adscendmfmarketing.com
detroitreels.com
xojiliv1.com
mzhhxxff.xyz
hitcomply.com
piedge-taiko.net
chiri.lat
bookmygaddi.com
hjemfinesse.shop
zruypj169g.top
solarfundis.com
pittsparking.com
teplo-invest.com
j3k7n.xyz
coloradoskinwellness.com
z8ggd.com
coinbureau.xyz
mamasprinkleofjoy.com
xotj7a.xyz
nijssenadventures.com
ysa-cn.com
tigajco69.fun
localhomeservicesadvisor.com
attorney-services-8344642.zone
rnwaifu.xyz
nyverian.com
family-lawyers-7009103.world
117myw.com
kingdom66.lat
tdshomesolution.com
momof2filiricans.com
saeutah.com
rakring.com
upcyclecharms.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5020-0-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4844 set thread context of 5020 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2268 5020 WerFault.exe 84 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 5020 ilasm.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4844 wrote to memory of 5020 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe 84 PID 4844 wrote to memory of 5020 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe 84 PID 4844 wrote to memory of 5020 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe 84 PID 4844 wrote to memory of 5020 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe 84 PID 4844 wrote to memory of 5020 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe 84 PID 4844 wrote to memory of 5020 4844 fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe"C:\Users\Admin\AppData\Local\Temp\fcf632af143e88dfba5e9256d0fb238eb314b0d20e63141cb659ed7ad001cbb4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵
- Suspicious use of UnmapMainImage
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 203⤵
- Program crash
PID:2268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5020 -ip 50201⤵PID:3220