Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2023, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe
Resource
win7-20230712-en
General
-
Target
8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe
-
Size
689KB
-
MD5
549506be461e63f925b424b2f6011916
-
SHA1
809e73cea714e24c15f65c27eff6371723149323
-
SHA256
8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863
-
SHA512
0c254f269004b3999284fb9e4bacc71082be27d7a178106bcb9150e2bf66723d98f0755fae8eda8f05ed24aeabf8ef49eb91556ed417b7c6ecec6dcbb04ad6b4
-
SSDEEP
12288:S5MYH1VTW4TmZnXmQtXQ7SHbtvTug/gjtkb9:S6wrbTmJmQtXQ7S7tvTuacCb9
Malware Config
Extracted
formbook
4.1
sy22
vinteligencia.com
displayfridges.fun
completetip.com
giallozafferrano.com
jizihao1.com
mysticheightstrail.com
fourseasonslb.com
kjnala.shop
mosiacwall.com
vandistreet.com
gracefullytouchedartistry.com
hbiwhwr.shop
mfmz.net
hrmbrillianz.com
funwarsztat.com
polewithcandy.com
ourrajasthan.com
wilhouettteamerica.com
johnnystintshop.com
asgnelwin.com
alcmcyu.com
thwmlohr.click
gypseascuba.com
mysonisgaythemovie.com
sunriseautostorellc.com
fuhouse.link
motorcycleglassesshop.com
vaskaworldairways.com
qixservice.online
b2b-scaling.com
03ss.vip
trishpintar.com
gk84.com
omclaval.com
emeeycarwash.com
wb7mnp.com
kimgj.com
278809.com
summitstracecolumbus.com
dryadai.com
vistcreative.com
weoliveorder.com
kwamitikki.com
cjk66.online
travisline.pro
mercardosupltda.shop
sunspotplumbing.com
podplugca.com
leontellez.com
fzturf.com
docomo-mobileconsulting.com
apneabirmingham.info
rollesgraciejiujitsu.com
sx15k.com
kebobcapital.com
91967.net
claudiaduverglas.com
zhperviepixie.com
oliwas.xyz
flowersinspace.tech
uadmxqby.click
greatbaitusa.com
drpenawaraircondhargarahmah.com
sofbks.top
sarthaksrishticreation.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1368-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4856 set thread context of 1368 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 93 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 1368 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 1368 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4856 wrote to memory of 1612 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 90 PID 4856 wrote to memory of 1612 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 90 PID 4856 wrote to memory of 1612 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 90 PID 4856 wrote to memory of 1424 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 91 PID 4856 wrote to memory of 1424 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 91 PID 4856 wrote to memory of 1424 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 91 PID 4856 wrote to memory of 3092 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 92 PID 4856 wrote to memory of 3092 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 92 PID 4856 wrote to memory of 3092 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 92 PID 4856 wrote to memory of 1368 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 93 PID 4856 wrote to memory of 1368 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 93 PID 4856 wrote to memory of 1368 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 93 PID 4856 wrote to memory of 1368 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 93 PID 4856 wrote to memory of 1368 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 93 PID 4856 wrote to memory of 1368 4856 8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"2⤵PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"2⤵PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"2⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e1579332c108b91cf104ac63a80be9cabcd918086bcd27248e59467776fc863exe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-