Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
47ea784b5aa582da550a12add7ccd74d.exe
Resource
win7-20230831-en
General
-
Target
47ea784b5aa582da550a12add7ccd74d.exe
-
Size
588KB
-
MD5
47ea784b5aa582da550a12add7ccd74d
-
SHA1
5b6ae1d9193def3a895b102bc8340120bd5b8ea5
-
SHA256
e3adb8e74cd21839185ef70b6430c229a34636536412afc08bfbf1b8a610b359
-
SHA512
b4be253005f12497d76c320d14e3a9efc8632fe381baf6e1ff7aef6de5d4dc963fbfc83a944ce1f99939d3e7626ee0fb47d6b0687041d54b0b4e2e1ebd86306e
-
SSDEEP
12288:12iNMyiRJU/WcGzm+ELUGomnz95ZaYXsWcB69OFv6GezldNxbfvoRRDEtBA:11FFe+tYGJnz95ZaYXmB6k6hBnxzgTDV
Malware Config
Extracted
formbook
4.1
o5gu
jonathanvuportfolio.website
moneyboost.net
imikecutyou.com
toollessassembling.com
keoinfra.com
mackenziejamesphoto.com
zenovaa.com
ngmnetwork.com
odropoficial.com
huyangli.company
ganjajuice.info
promptmechanic.xyz
crispyjoy.com
dinevintageshirts.com
heyxop.online
hopefinancialmarketingph.com
weeklyvolcano.app
consultoriopmn.com
seetheratequote.com
ftds77.com
neuepilates.com
akaegostudios.com
solhealthglobal.com
edelweiss45.online
getalign.info
playermaveric.click
osuszdom.com
eastern-prime.com
4zc.lat
ssongg3888.cfd
polar-tours.com
herbahis239.com
funeral-services.com
chawlaaluminium.com
aintrepreneurship.com
chiefsuppliesllc.com
easyhub.xyz
umaylek.site
menofthehouse.store
11cmace.vip
mostbet-wcx4.top
robbiexgeorgie.com
elliotlakefield.com
marcjacobssalecanada.com
barbiealien.com
mcfeeinsurance.com
hk-newbie.com
sportscolorslove.com
zabarofficial.com
seva.fund
lion-sales.com
jebwallet.app
appsrocky.top
viruceaseusa.com
aaronlea.design
lyftpassengerslawyers.com
defiacquisition.com
iuzswq.top
acreeksis.online
rkautomationservice.com
pkn910.com
sykdnxjxbyu.xyz
hegre-shaved-girls.com
scentwithluv.com
felix-froehlich.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2624-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2624 47ea784b5aa582da550a12add7ccd74d.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30 PID 1448 wrote to memory of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30 PID 1448 wrote to memory of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30 PID 1448 wrote to memory of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30 PID 1448 wrote to memory of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30 PID 1448 wrote to memory of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30 PID 1448 wrote to memory of 2624 1448 47ea784b5aa582da550a12add7ccd74d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\47ea784b5aa582da550a12add7ccd74d.exe"C:\Users\Admin\AppData\Local\Temp\47ea784b5aa582da550a12add7ccd74d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\47ea784b5aa582da550a12add7ccd74d.exe"C:\Users\Admin\AppData\Local\Temp\47ea784b5aa582da550a12add7ccd74d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-