{"C2 list": ["www.riceandginger.com/fcn/"], "decoy": ["bellee-select.com", "unlock-motorola.com", "courtneyrunyon.com", "hnzywjz.com", "retrievingbest.net", "ayescarrental.com", "beyoutifulblessings.com", "heritagediscovery.net", "fasoum.com", "wbz.xyz", "lownak.com", "alinkarmay.com", "coffeyquiltco.com", "validdreamers.com", "yuksukcu.club", "buildnextfrc.com", "avantfarme.com", "xyfs360.com", "holisticpacific.com", "banejia.com", "champsn.com", "ebitit.com", "esseneceedibles.com", "findmyautoparts.com", "belenusadvisory.net", "esrise.net", "lovewillfindaway.net", "chienluocmarketing.net", "greenbelieve.com", "shopyourgift.com", "theweddingofshadiandmike.com", "greenstavern.com", "klinku.com", "norastravel.com", "team5thgroup.com", "ohrchadash.com", "hauteandcood.com", "ap-333.com", "jonathantyar.com", "robertabraham.com", "citestaccnt1597691130.com", "665asilo.com", "deerokoj.com", "ezcovid19.com", "heritageivhoa.com", "ultraprecisiondata.com", "alkiefsaudi.com", "camelliaflowers.space", "clickqrcoaster.com", "ponorogokita.com", "stainlesslion.com", "china-ymc.com", "littner.xyz", "houseof2.com", "metabolytix.com", "1000-help6.club", "another-sc.com", "suafrisolac.com", "whitetreechainmail.com", "amazon-service-app-account.com", "cruiseameroca.com", "yaxett.net", "adsmat.com", "afternoontravel.site"]}
Source: 00000000.00000002.240240233.0000000002670000.00000004.00000001.sdmp | Malware Configuration Extractor: FormBook {"C2 list": ["www.riceandginger.com/fcn/"], "decoy": ["bellee-select.com", "unlock-motorola.com", "courtneyrunyon.com", "hnzywjz.com", "retrievingbest.net", "ayescarrental.com", "beyoutifulblessings.com", "heritagediscovery.net", "fasoum.com", "wbz.xyz", "lownak.com", "alinkarmay.com", "coffeyquiltco.com", "validdreamers.com", "yuksukcu.club", "buildnextfrc.com", "avantfarme.com", "xyfs360.com", "holisticpacific.com", "banejia.com", "champsn.com", "ebitit.com", "esseneceedibles.com", "findmyautoparts.com", "belenusadvisory.net", "esrise.net", "lovewillfindaway.net", "chienluocmarketing.net", "greenbelieve.com", "shopyourgift.com", "theweddingofshadiandmike.com", "greenstavern.com", "klinku.com", "norastravel.com", "team5thgroup.com", "ohrchadash.com", "hauteandcood.com", "ap-333.com", "jonathantyar.com", "robertabraham.com", "citestaccnt1597691130.com", "665asilo.com", "deerokoj.com", "ezcovid19.com", "heritageivhoa.com", "ultraprecisiondata.com", "alkiefsaudi.com", "camelliaflowers.space", "clickqrcoaster.com", "ponorogokita.com", "stainlesslion.com", "china-ymc.com", "littner.xyz", "houseof2.com", "metabolytix.com", "1000-help6.club", "another-sc.com", "suafrisolac.com", "whitetreechainmail.com", "amazon-service-app-account.com", "cruiseameroca.com", "yaxett.net", "adsmat.com", "afternoontravel.site"]} |
Source: Yara match | File source: 00000000.00000002.240240233.0000000002670000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.495059747.0000000000200000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.281309352.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.281955301.0000000000CF0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.281979783.0000000000D20000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.496196901.0000000004B30000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000001.235598141.0000000000400000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 1.2.PO.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.1.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.PO.exe.2670000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.PO.exe.2670000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.1.PO.exe.400000.0.unpack, type: UNPACKEDPE |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://fontfabrik.com |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fonts.com |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.tiro.com |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.typography.netD |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: explorer.exe, 00000002.00000000.268129348.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: C:\Users\user\Desktop\PO.exe | Code function: 0_2_00404EA0 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,lstrlenA,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_00404EA0 |
Source: Yara match | File source: 00000000.00000002.240240233.0000000002670000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.495059747.0000000000200000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.281309352.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.281955301.0000000000CF0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.281979783.0000000000D20000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.496196901.0000000004B30000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000001.235598141.0000000000400000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 1.2.PO.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.1.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.PO.exe.2670000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.PO.exe.2670000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.1.PO.exe.400000.0.unpack, type: UNPACKEDPE |
Source: 00000000.00000002.240240233.0000000002670000.00000004.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000000.00000002.240240233.0000000002670000.00000004.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000008.00000002.495059747.0000000000200000.00000004.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000008.00000002.495059747.0000000000200000.00000004.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000002.281309352.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000002.281309352.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000002.281955301.0000000000CF0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000002.281955301.0000000000CF0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000002.281979783.0000000000D20000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000002.281979783.0000000000D20000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000008.00000002.496196901.0000000004B30000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000008.00000002.496196901.0000000004B30000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000001.235598141.0000000000400000.00000040.00020000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000001.235598141.0000000000400000.00000040.00020000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 1.2.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 1.2.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 1.2.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 1.2.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 1.1.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 1.1.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 0.2.PO.exe.2670000.1.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 0.2.PO.exe.2670000.1.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 0.2.PO.exe.2670000.1.raw.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 0.2.PO.exe.2670000.1.raw.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 1.1.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 1.1.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00419D60 NtCreateFile, | 1_2_00419D60 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00419E10 NtReadFile, | 1_2_00419E10 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00419E90 NtClose, | 1_2_00419E90 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00419F40 NtAllocateVirtualMemory, | 1_2_00419F40 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00419DB3 NtReadFile, | 1_2_00419DB3 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00419E8A NtClose, | 1_2_00419E8A |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00419F3B NtAllocateVirtualMemory, | 1_2_00419F3B |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A298F0 NtReadVirtualMemory,LdrInitializeThunk, | 1_2_00A298F0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29860 NtQuerySystemInformation,LdrInitializeThunk, | 1_2_00A29860 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29840 NtDelayExecution,LdrInitializeThunk, | 1_2_00A29840 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A299A0 NtCreateSection,LdrInitializeThunk, | 1_2_00A299A0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29910 NtAdjustPrivilegesToken,LdrInitializeThunk, | 1_2_00A29910 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29A20 NtResumeThread,LdrInitializeThunk, | 1_2_00A29A20 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29A00 NtProtectVirtualMemory,LdrInitializeThunk, | 1_2_00A29A00 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29A50 NtCreateFile,LdrInitializeThunk, | 1_2_00A29A50 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A295D0 NtClose,LdrInitializeThunk, | 1_2_00A295D0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29540 NtReadFile,LdrInitializeThunk, | 1_2_00A29540 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A296E0 NtFreeVirtualMemory,LdrInitializeThunk, | 1_2_00A296E0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29660 NtAllocateVirtualMemory,LdrInitializeThunk, | 1_2_00A29660 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A297A0 NtUnmapViewOfSection,LdrInitializeThunk, | 1_2_00A297A0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29780 NtMapViewOfSection,LdrInitializeThunk, | 1_2_00A29780 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29710 NtQueryInformationToken,LdrInitializeThunk, | 1_2_00A29710 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A298A0 NtWriteVirtualMemory, | 1_2_00A298A0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29820 NtEnumerateKey, | 1_2_00A29820 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A2B040 NtSuspendThread, | 1_2_00A2B040 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A299D0 NtCreateProcessEx, | 1_2_00A299D0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29950 NtQueueApcThread, | 1_2_00A29950 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29A80 NtOpenDirectoryObject, | 1_2_00A29A80 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29A10 NtQuerySection, | 1_2_00A29A10 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A2A3B0 NtGetContextThread, | 1_2_00A2A3B0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29B00 NtSetValueKey, | 1_2_00A29B00 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A295F0 NtQueryInformationFile, | 1_2_00A295F0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29520 NtWaitForSingleObject, | 1_2_00A29520 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A2AD30 NtSetContextThread, | 1_2_00A2AD30 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29560 NtWriteFile, | 1_2_00A29560 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A296D0 NtCreateKey, | 1_2_00A296D0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29610 NtEnumerateValueKey, | 1_2_00A29610 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29670 NtQueryInformationProcess, | 1_2_00A29670 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29650 NtQueryValueKey, | 1_2_00A29650 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29FE0 NtCreateMutant, | 1_2_00A29FE0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29730 NtQueryVirtualMemory, | 1_2_00A29730 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A2A710 NtOpenProcessToken, | 1_2_00A2A710 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29760 NtOpenProcess, | 1_2_00A29760 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A29770 NtSetInformationFile, | 1_2_00A29770 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A2A770 NtOpenThread, | 1_2_00A2A770 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_00419D60 NtCreateFile, | 1_1_00419D60 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_00419E10 NtReadFile, | 1_1_00419E10 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_00419E90 NtClose, | 1_1_00419E90 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_00419F40 NtAllocateVirtualMemory, | 1_1_00419F40 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B49D60 NtCreateFile, | 8_2_04B49D60 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B49E90 NtClose, | 8_2_04B49E90 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B49E10 NtReadFile, | 8_2_04B49E10 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B49F40 NtAllocateVirtualMemory, | 8_2_04B49F40 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B49DB3 NtReadFile, | 8_2_04B49DB3 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B49E8A NtClose, | 8_2_04B49E8A |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B49F3B NtAllocateVirtualMemory, | 8_2_04B49F3B |
Source: C:\Users\user\Desktop\PO.exe | Code function: 0_2_0040314A EntryPoint,#17,OleInitialize,SHGetFileInfoA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,GetCommandLineA,GetModuleHandleA,CharNextA,OleUninitialize,ExitProcess,lstrcatA,CreateDirectoryA,lstrcatA,lstrcatA,DeleteFileA,GetModuleFileNameA,lstrcmpiA,CopyFileA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, | 0_2_0040314A |
Source: C:\Users\user\Desktop\PO.exe | Code function: 0_2_004046A7 | 0_2_004046A7 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00401027 | 1_2_00401027 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00401030 | 1_2_00401030 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041E100 | 1_2_0041E100 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041E246 | 1_2_0041E246 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00402D90 | 1_2_00402D90 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00409E40 | 1_2_00409E40 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00409E3C | 1_2_00409E3C |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041DF12 | 1_2_0041DF12 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041DF1C | 1_2_0041DF1C |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00402FB0 | 1_2_00402FB0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A120A0 | 1_2_00A120A0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_009FB090 | 1_2_009FB090 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00AA1002 | 1_2_00AA1002 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A04120 | 1_2_00A04120 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_009EF900 | 1_2_009EF900 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A1EBB0 | 1_2_00A1EBB0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_009F841F | 1_2_009F841F |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A12581 | 1_2_00A12581 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_009FD5E0 | 1_2_009FD5E0 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_009E0D20 | 1_2_009E0D20 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00AB1D55 | 1_2_00AB1D55 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A06E30 | 1_2_00A06E30 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_00401027 | 1_1_00401027 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_00401030 | 1_1_00401030 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_0041E100 | 1_1_0041E100 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_0041E246 | 1_1_0041E246 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B32D90 | 8_2_04B32D90 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B39E3C | 8_2_04B39E3C |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B39E40 | 8_2_04B39E40 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B32FB0 | 8_2_04B32FB0 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4DF12 | 8_2_04B4DF12 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4DF1C | 8_2_04B4DF1C |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4E100 | 8_2_04B4E100 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4E246 | 8_2_04B4E246 |
Source: 00000000.00000002.240240233.0000000002670000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000000.00000002.240240233.0000000002670000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000008.00000002.495059747.0000000000200000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000008.00000002.495059747.0000000000200000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000002.281309352.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000002.281309352.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000002.281955301.0000000000CF0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000002.281955301.0000000000CF0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000002.281979783.0000000000D20000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000002.281979783.0000000000D20000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000008.00000002.496196901.0000000004B30000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000008.00000002.496196901.0000000004B30000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000001.235598141.0000000000400000.00000040.00020000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000001.235598141.0000000000400000.00000040.00020000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 1.2.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 1.2.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 1.2.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 1.2.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 1.1.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 1.1.PO.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 0.2.PO.exe.2670000.1.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 0.2.PO.exe.2670000.1.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 0.2.PO.exe.2670000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 0.2.PO.exe.2670000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 1.1.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 1.1.PO.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041E34F push eax; ret | 1_2_0041E356 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00417CCE push 7FCF5E29h; iretd | 1_2_00417CD3 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00417CD7 push ebx; retf | 1_2_00417CDF |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_004164B4 push esi; ret | 1_2_004164BD |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00417D58 push esp; iretd | 1_2_00417D5A |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041CEB5 push eax; ret | 1_2_0041CF08 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041CF6C push eax; ret | 1_2_0041CF72 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041CF02 push eax; ret | 1_2_0041CF08 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_0041CF0B push eax; ret | 1_2_0041CF72 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_2_00A3D0D1 push ecx; ret | 1_2_00A3D0E4 |
Source: C:\Users\user\Desktop\PO.exe | Code function: 1_1_0041E34F push eax; ret | 1_1_0041E356 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B464B4 push esi; ret | 8_2_04B464BD |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B47CD7 push ebx; retf | 8_2_04B47CDF |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B47CCE push 7FCF5E29h; iretd | 8_2_04B47CD3 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B47D58 push esp; iretd | 8_2_04B47D5A |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4CEB5 push eax; ret | 8_2_04B4CF08 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4CF02 push eax; ret | 8_2_04B4CF08 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4CF0B push eax; ret | 8_2_04B4CF72 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4CF6C push eax; ret | 8_2_04B4CF72 |
Source: C:\Windows\SysWOW64\chkdsk.exe | Code function: 8_2_04B4E34F push eax; ret | 8_2_04B4E356 |