Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe
Resource
win7-20231020-en
General
-
Target
NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe
-
Size
589KB
-
MD5
c93182a4cf39e6a36f143371cd3cdac1
-
SHA1
9388f926f519112cad9bc5d58cb132a50acaf3ae
-
SHA256
760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139
-
SHA512
9c8923b71c19dc7ec47a3df430d094fd6b55d727be51e7d68a1c594753c1ebe1e51134a8f21db12e02e2293325b0ba8b5298838762ed80320da8277a9403e0de
-
SSDEEP
12288:L8zS55mFzaz4QP5y8YToG7a77FI0LcD8VrdYdQnoc2Z6uj0:Lf55qG4+5y8COm0LYW5YdQnWZ6G
Malware Config
Extracted
formbook
4.1
ls02
vocabularybot.com
invisalignsmilesolutions.xyz
sleepdisorderinsomnia.com
bern.beauty
ahazmcdris.top
21874960sie8ca1.store
yeitced.xyz
biggerpictureventures.com
alduhagroup.com
itsolutions.biz
0oq6y.com
wildpolis.com
mariobet469.com
brynnwpods.com
tastywin.com
cou2m1.com
newaitrucks.com
puremeans.studio
mitienda-la.com
jujuresorthotel.com
kmjdhq.com
2840vacations.com
recchia-assicura.com
danetresales.com
crashed.boats
canton404.com
bluetilestudio.com
dfcf68333.net
smartplusplatform.online
apotheekgemak.online
arsmassagii.com
keenly-digital.com
uptravelcrm.com
loftybud.com
djfiremangambia.com
dreamydesiresstudio.com
perezzuriagaarquitecto.com
alisseo.com
smnxp.com
dhsgnk.com
ernestveremu.com
e2owaz8zskz.asia
stannesnstyrrellspass.com
delimikrofon.com
commodityrisks.com
ghghhgettt22.top
biggestbasispoints.com
evelmeedical.com
sentrumsnytt.online
kingdom69amp.com
bhphub.com
k5h5v.com
wuliangysh12.cloud
annasutraasource.net
greatairconditioners1.buzz
subpaylive.com
assumablemortgagenetwork.com
flairity.tech
shoutart.com
miy9.icu
nebudali.com
bagishopping.com
baiyeba.com
nycoapartments.com
wisewolftdot.online
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2840-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1576 set thread context of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 2840 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2852 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 30 PID 1576 wrote to memory of 2852 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 30 PID 1576 wrote to memory of 2852 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 30 PID 1576 wrote to memory of 2852 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 30 PID 1576 wrote to memory of 2712 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 31 PID 1576 wrote to memory of 2712 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 31 PID 1576 wrote to memory of 2712 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 31 PID 1576 wrote to memory of 2712 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 31 PID 1576 wrote to memory of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32 PID 1576 wrote to memory of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32 PID 1576 wrote to memory of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32 PID 1576 wrote to memory of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32 PID 1576 wrote to memory of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32 PID 1576 wrote to memory of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32 PID 1576 wrote to memory of 2840 1576 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"2⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"2⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-