Analysis
-
max time kernel
134s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2023 18:44
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe
Resource
win7-20231020-en
General
-
Target
NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe
-
Size
613KB
-
MD5
5b1b412ccc9ccca7f9156c3a4e3badee
-
SHA1
8222046cd5c8c57d2b4e51f4b987ac339afb2461
-
SHA256
fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6
-
SHA512
f6c99f41c7f58b4e9a4906911771669215f9ce7525d27c0f9f19e3263a712e5e4bbdd41b5560cc73f795176e79aaaf0ce6d3bc9068796dd3b7010a010a39a4a8
-
SSDEEP
12288:XhNh6sxTA6qNh3NDsJkr7ZAYkUPBzknjq2/68Q3ZfKNtX7+A7yNse8yFx5t1h:XDDxs6gzsJ+PBzknjx6vQV7wNsIFN1
Malware Config
Extracted
formbook
4.1
fw02
photonplayground.shop
bestonlinecasinos1.com
ks3633.com
vozandvalor.com
crowdfundmylife.com
rfidci.top
onhdl.cloud
asianwithshorthair.com
m4i6g.com
sb1388.com
ekantipurdainik.com
jonesbridgeltd.com
emilylau.xyz
alveomx.com
stekloff.online
gzzzcszx.com
hi-fishop.com
eureka-fashion.shop
mprojektai.com
scaletiktokyws.com
pornmovs.cam
ggyxw.com
h-deez.com
luxdope.com
surptb.xyz
konzertbern25.com
theworldwidepost.com
sugarmedica.com
alivebodyreset.com
ne-ops.com
rsteamproject.com
telesur889.com
ruianxinlei.com
accountingist.com
ashewabranding.com
systemasmdp.com
memphiswaterandmold.com
iptv-germany.com
thedollsstudiosuite.com
goldenbahis511.com
triveniholidays.com
vinjd.com
yushan2021.com
p326.vip
tcg01.top
wpseoaimarketing.com
tintedpanda.com
etinteracdeposit.com
coachingprozesse.online
deardeafdogs.com
xtratorrent.com
losbelones.com
mritalentpodcast.com
monarchstitle.com
pentecostalsermons.com
animeshia.com
justem-aws.com
vifit.store
oceanfreightcarriers.com
zakbyajklqrra.top
kbq9r.top
converonlinefree.com
deinservice.com
taofinland.com
dr-seek.life
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1924-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exedescription pid process target process PID 4684 set thread context of 1924 4684 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exepid process 1924 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe 1924 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exedescription pid process target process PID 4684 wrote to memory of 1924 4684 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe PID 4684 wrote to memory of 1924 4684 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe PID 4684 wrote to memory of 1924 4684 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe PID 4684 wrote to memory of 1924 4684 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe PID 4684 wrote to memory of 1924 4684 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe PID 4684 wrote to memory of 1924 4684 NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fa8b2e6ab78a1b6cb804a7125624b693a9271e19a6091737534d1f471c7762c6exe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1924-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1924-16-0x0000000001280000-0x00000000015CA000-memory.dmpFilesize
3.3MB
-
memory/4684-8-0x0000000074FC0000-0x0000000075770000-memory.dmpFilesize
7.7MB
-
memory/4684-9-0x0000000005B50000-0x0000000005B60000-memory.dmpFilesize
64KB
-
memory/4684-4-0x0000000005B50000-0x0000000005B60000-memory.dmpFilesize
64KB
-
memory/4684-5-0x0000000005A80000-0x0000000005A8A000-memory.dmpFilesize
40KB
-
memory/4684-6-0x0000000005B00000-0x0000000005B1C000-memory.dmpFilesize
112KB
-
memory/4684-7-0x0000000005A70000-0x0000000005A7C000-memory.dmpFilesize
48KB
-
memory/4684-0-0x0000000074FC0000-0x0000000075770000-memory.dmpFilesize
7.7MB
-
memory/4684-3-0x00000000059C0000-0x0000000005A52000-memory.dmpFilesize
584KB
-
memory/4684-10-0x0000000005420000-0x0000000005430000-memory.dmpFilesize
64KB
-
memory/4684-11-0x0000000006990000-0x00000000069FE000-memory.dmpFilesize
440KB
-
memory/4684-12-0x0000000006AA0000-0x0000000006B3C000-memory.dmpFilesize
624KB
-
memory/4684-2-0x0000000005E70000-0x0000000006414000-memory.dmpFilesize
5.6MB
-
memory/4684-15-0x0000000074FC0000-0x0000000075770000-memory.dmpFilesize
7.7MB
-
memory/4684-1-0x0000000000F50000-0x0000000000FF0000-memory.dmpFilesize
640KB