Analysis
-
max time kernel
152s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 17:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe
-
Size
559KB
-
MD5
641b93249d87d4a7c59d4896a61a29cd
-
SHA1
c1259ec9f29890ea520faa81c2b10ffe61add985
-
SHA256
89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596
-
SHA512
c6014c21a90711a8ca83ba9a2b843e9fa855a5808caecab4841c08609bb5c2dc919c58ffd2777dc0b3e887e85b2b1555bdc20e2c1df6b3910b59e6a3b63973e5
-
SSDEEP
12288:VXICvof8kZTYRFm6YCrkEitIq+fX7qk8AVyiI:VXICvof8SMR8ZUeIq+v7sqw
Malware Config
Extracted
formbook
4.1
fw02
photonplayground.shop
bestonlinecasinos1.com
ks3633.com
vozandvalor.com
crowdfundmylife.com
rfidci.top
onhdl.cloud
asianwithshorthair.com
m4i6g.com
sb1388.com
ekantipurdainik.com
jonesbridgeltd.com
emilylau.xyz
alveomx.com
stekloff.online
gzzzcszx.com
hi-fishop.com
eureka-fashion.shop
mprojektai.com
scaletiktokyws.com
pornmovs.cam
ggyxw.com
h-deez.com
luxdope.com
surptb.xyz
konzertbern25.com
theworldwidepost.com
sugarmedica.com
alivebodyreset.com
ne-ops.com
rsteamproject.com
telesur889.com
ruianxinlei.com
accountingist.com
ashewabranding.com
systemasmdp.com
memphiswaterandmold.com
iptv-germany.com
thedollsstudiosuite.com
goldenbahis511.com
triveniholidays.com
vinjd.com
yushan2021.com
p326.vip
tcg01.top
wpseoaimarketing.com
tintedpanda.com
etinteracdeposit.com
coachingprozesse.online
deardeafdogs.com
xtratorrent.com
losbelones.com
mritalentpodcast.com
monarchstitle.com
pentecostalsermons.com
animeshia.com
justem-aws.com
vifit.store
oceanfreightcarriers.com
zakbyajklqrra.top
kbq9r.top
converonlinefree.com
deinservice.com
taofinland.com
dr-seek.life
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1572-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exedescription pid process target process PID 220 set thread context of 1572 220 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exepid process 1572 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe 1572 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exedescription pid process target process PID 220 wrote to memory of 1572 220 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe PID 220 wrote to memory of 1572 220 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe PID 220 wrote to memory of 1572 220 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe PID 220 wrote to memory of 1572 220 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe PID 220 wrote to memory of 1572 220 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe PID 220 wrote to memory of 1572 220 NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS89bcf1ff783e9986332cd6debe5fe5f424439518b7638f56b8322541a460f596exeexeexe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/220-6-0x0000000004E50000-0x0000000004E5A000-memory.dmpFilesize
40KB
-
memory/220-8-0x0000000005450000-0x0000000005466000-memory.dmpFilesize
88KB
-
memory/220-2-0x0000000005480000-0x0000000005A24000-memory.dmpFilesize
5.6MB
-
memory/220-3-0x0000000004ED0000-0x0000000004F62000-memory.dmpFilesize
584KB
-
memory/220-4-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/220-5-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/220-1-0x00000000003D0000-0x0000000000460000-memory.dmpFilesize
576KB
-
memory/220-7-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/220-0-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/220-9-0x00000000008E0000-0x00000000008F0000-memory.dmpFilesize
64KB
-
memory/220-10-0x00000000060A0000-0x000000000610E000-memory.dmpFilesize
440KB
-
memory/220-11-0x0000000008E00000-0x0000000008E9C000-memory.dmpFilesize
624KB
-
memory/220-14-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/1572-12-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1572-15-0x0000000001AE0000-0x0000000001E2A000-memory.dmpFilesize
3.3MB