Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe
Resource
win7-20231020-en
General
-
Target
NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe
-
Size
589KB
-
MD5
c93182a4cf39e6a36f143371cd3cdac1
-
SHA1
9388f926f519112cad9bc5d58cb132a50acaf3ae
-
SHA256
760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139
-
SHA512
9c8923b71c19dc7ec47a3df430d094fd6b55d727be51e7d68a1c594753c1ebe1e51134a8f21db12e02e2293325b0ba8b5298838762ed80320da8277a9403e0de
-
SSDEEP
12288:L8zS55mFzaz4QP5y8YToG7a77FI0LcD8VrdYdQnoc2Z6uj0:Lf55qG4+5y8COm0LYW5YdQnWZ6G
Malware Config
Extracted
formbook
4.1
ls02
vocabularybot.com
invisalignsmilesolutions.xyz
sleepdisorderinsomnia.com
bern.beauty
ahazmcdris.top
21874960sie8ca1.store
yeitced.xyz
biggerpictureventures.com
alduhagroup.com
itsolutions.biz
0oq6y.com
wildpolis.com
mariobet469.com
brynnwpods.com
tastywin.com
cou2m1.com
newaitrucks.com
puremeans.studio
mitienda-la.com
jujuresorthotel.com
kmjdhq.com
2840vacations.com
recchia-assicura.com
danetresales.com
crashed.boats
canton404.com
bluetilestudio.com
dfcf68333.net
smartplusplatform.online
apotheekgemak.online
arsmassagii.com
keenly-digital.com
uptravelcrm.com
loftybud.com
djfiremangambia.com
dreamydesiresstudio.com
perezzuriagaarquitecto.com
alisseo.com
smnxp.com
dhsgnk.com
ernestveremu.com
e2owaz8zskz.asia
stannesnstyrrellspass.com
delimikrofon.com
commodityrisks.com
ghghhgettt22.top
biggestbasispoints.com
evelmeedical.com
sentrumsnytt.online
kingdom69amp.com
bhphub.com
k5h5v.com
wuliangysh12.cloud
annasutraasource.net
greatairconditioners1.buzz
subpaylive.com
assumablemortgagenetwork.com
flairity.tech
shoutart.com
miy9.icu
nebudali.com
bagishopping.com
baiyeba.com
nycoapartments.com
wisewolftdot.online
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2088-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5100 set thread context of 2088 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 2088 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 2088 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4648 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 84 PID 5100 wrote to memory of 4648 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 84 PID 5100 wrote to memory of 4648 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 84 PID 5100 wrote to memory of 4640 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 85 PID 5100 wrote to memory of 4640 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 85 PID 5100 wrote to memory of 4640 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 85 PID 5100 wrote to memory of 2088 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 86 PID 5100 wrote to memory of 2088 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 86 PID 5100 wrote to memory of 2088 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 86 PID 5100 wrote to memory of 2088 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 86 PID 5100 wrote to memory of 2088 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 86 PID 5100 wrote to memory of 2088 5100 NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"2⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"2⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.760d1dd7bb42f4e5326377a4d8368703b5638f6a14988e1a8ead94524b3a0139exe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-