Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2023 12:44
Static task
static1
Behavioral task
behavioral1
Sample
6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe
Resource
win7-20230831-en
General
-
Target
6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe
-
Size
650KB
-
MD5
e189c425869e466d842c472d895035d7
-
SHA1
e50796539a9fd5c50f6569c00c2d01709bf203db
-
SHA256
6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d
-
SHA512
49c10e95d653531d4f92c3377f351c5639971fb58513aac23c803bb4ba930de101c20dd77649e1dd7bb207e6ba64150af2c99deb174bb7a5d62fe948b6d308f1
-
SSDEEP
12288:VcrAckjQ5bLSqHcGdDY30I3lYPiICl45mLPKNDOvNvttVZeDh1:OkabLjcIc0I3l4wlBLCm7V
Malware Config
Extracted
formbook
4.1
4hc5
amandaastburyillustration.com
7141999.com
showshoe.info
sagemarlin.com
lithuaniandreamtime.com
therenixgroupllc.com
avalialooks.shop
vurporn.com
lemmy.systems
2816goldfinch.com
pacersun.com
checktrace.com
loadtransfer.site
matsuri-jujutsukaisen.com
iontrapper.science
5108010.com
beidixi.com
21305599.com
peakvitality.fitness
osisfeelingfee.com
hotshark-shop.com
bollywood.nexus
stephenplattassociatesllp.com
bakepreneurs.com
claudiobarros.online
akabou-hayasaka.com
collibrishop.online
britishfemalevo.com
prestigesmp.online
wzmatics.com
sactribune.com
slotjitu88.website
theproactiveexpat.com
therealnikib.com
elnoh.life
tianyan110.com
tcbbuilds.com
zhe276.com
c1405.com
candicrem.com
lambdasigmarho.com
gemwhk.store
crissmendez.com
locduongseafood.com
jessformdsenate.info
329.bio
nbgonghe.com
tr-ij.com
quailrun-inc.com
pathlightpropertiesmgt.com
lpqxmz.site
castlegrouplt.com
beautybylily.com
bernabeicarniceriaygranja.com
spicax.com
globalentertainmentservices.com
modluxenwa.com
imaswe.com
hntv6201.top
homerevamps.today
motionmixmedia.com
antojitoslosramos.com
julieslive.com
bepnuclasechia.com
iqixuehe.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1268-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 328 set thread context of 1268 328 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 98 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 1268 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 328 wrote to memory of 1268 328 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 98 PID 328 wrote to memory of 1268 328 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 98 PID 328 wrote to memory of 1268 328 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 98 PID 328 wrote to memory of 1268 328 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 98 PID 328 wrote to memory of 1268 328 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 98 PID 328 wrote to memory of 1268 328 6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe"C:\Users\Admin\AppData\Local\Temp\6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe"C:\Users\Admin\AppData\Local\Temp\6ed8801868c8baadf89c50bff443e9c29002e0db951ee456ffba50bca1812d6d_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268
-