Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 13:29
Static task
static1
Behavioral task
behavioral1
Sample
e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe
Resource
win7-20230831-en
General
-
Target
e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe
-
Size
670KB
-
MD5
63d2a92b555fca71818d466c3f901b1c
-
SHA1
e8aa60ba1257726d74bc0f7664a3e854ce971c26
-
SHA256
e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6
-
SHA512
d415d26c953fdca8ccafc7170539f655323cd5a88d8bc449f1cd70ea765344ac29e8cc0d24cb6bdd4f3964862fe30b898c52ad895dd1f84f33305aec28d94edc
-
SSDEEP
12288:ZIswfJw1UDXxpkUK74GC3O+H15a6yPhH82g4vdhDz4Gf3Ol9:gBwQdK1i1iPRvnDzV
Malware Config
Extracted
formbook
4.1
ro12
start399.com
decyfincoin.com
binguozhijiaok.com
one45.vip
55dy5s.top
regmt.pro
2ahxgaafifl.com
xn--6rtp2flvfc2h.com
justinmburns.com
los3.online
fleshaaikensdivinegiven7llc.com
servicedelv.services
apexcaryhomesforsale.com
shuraop.xyz
sagetotal.com
gratitude-et-compagnie.com
riderarea.com
digitalserviceact.online
contentbyc.com
agenda-digital-planner.com
senior-living-91799.bond
navigationexperiments.com
tiktok-shop-he.com
qualityquickprints.com
ddbetting.com
navigatenuggets.com
indiannaturals.online
xzgx360.com
xlrj.asia
seagaming.net
saltcasing.info
pq-es.com
doubleapus.com
speedgallery.shop
millions-fans.com
ktrandnews.com
niaeoer.com
60plusmen.com
nala.dev
costanotaryservice.com
palokallio.net
sportsynergyemporium.fun
fathomtackle.com
computer-chronicles.com
valeriaestate.com
holzleisten24.shop
ps212naming.com
blessed-autos.com
rptiki.com
bjykswkj.com
vorbergh.info
ssongg273.cfd
thevitaminstore.store
easyeats307.com
mcied.link
ssongg1620.cfd
y-12federalcreditunion.top
jlh777.com
no5th3267.top
toolifyonline.com
hcsjwdy.com
ypwvj8.top
hja357b.com
bajie6.com
pwpholdings.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3824-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4768 set thread context of 3824 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 91 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 3824 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 3824 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4768 wrote to memory of 3824 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 91 PID 4768 wrote to memory of 3824 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 91 PID 4768 wrote to memory of 3824 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 91 PID 4768 wrote to memory of 3824 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 91 PID 4768 wrote to memory of 3824 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 91 PID 4768 wrote to memory of 3824 4768 e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe"C:\Users\Admin\AppData\Local\Temp\e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe"C:\Users\Admin\AppData\Local\Temp\e8daa9482a4d8379e8a1d3dea17ccb16746dc786522acfe79da2b833c525a9b6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-