Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 17:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe
Resource
win7-20231023-en
General
-
Target
NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe
-
Size
342KB
-
MD5
07ea9abe8aeda1c72f42967c7d9f475a
-
SHA1
5f495b957acc693e5019ee2ccb5a1f458286f67f
-
SHA256
a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a
-
SHA512
8cbdfc199506f980e282b93691bcf97b09d1d0617e9a533785a67f54e2ed267e0a957181deea3d958b46c48058531004a99456790cb1f24ba7455e9186fa2e53
-
SSDEEP
6144:wBlL/90OO8k3NWzK22YTzxAdhlpOxWe+mJ/0u4p6+zTV28BkvTXR:C/0Oe3NWh2dhoWG/0u4s+fyXR
Malware Config
Extracted
formbook
4.1
fs35
latechdz.com
sdp-ploce.com
ss203.site
sm6yuy.net
needstothink.com
heginstwp.com
blueplumespirit.com
vemconferirshop.click
yorent-auto.com
eleononaly.com
medicalspacelocators.com
7law.info
imacanberra.online
bbtyss.top
onlyanfans.com
varenty.com
fappies.shop
313865.com
hongpools.com
babkacuisine.xyz
usofty.com
jdjnxsu.com
teammonitoringservices.com
retortprocessinglab.com
rooferstakeoff.com
hansonelecs.com
em4ai.com
urbiznet.com
merchantgeniussaiyanflame.com
elegance-x-agency.com
cheekyfancy.com
ciaraile-hair.store
exactix.online
essentiallymotherearth.com
thebrollybuddy.com
associacaoacademicaguarda.com
manjort.xyz
mylifestylelounge.com
ser25kgr.monster
abbiejhooper.xyz
mjp77.com
dompompomdompom.shop
sugikougei.com
tacosantojrz.com
7yyhdjwwqq.com
vri4d.com
53b9fd8cfbfb.info
xlookcoins.top
uncongneniality.shop
coats-34172.bond
amazingpawpalace.com
actionkillsfear.com
supportlakecentral.com
xn--9kq7ik28o.club
lasermywords.com
t5-1682468.xyz
eastonelitesoftball.com
bagpackgalaxy.com
petlove6.com
fryconnect.online
autolusaccess.com
planetbravos.com
80smaoi.top
iit.world
i-ooedo.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2616-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2616-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2640-27-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/2640-29-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 10 2640 rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 2224 lqhpvxmtbn.exe 2616 lqhpvxmtbn.exe -
Loads dropped DLL 3 IoCs
pid Process 2188 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 2188 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 2224 lqhpvxmtbn.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2224 set thread context of 2616 2224 lqhpvxmtbn.exe 29 PID 2616 set thread context of 1268 2616 lqhpvxmtbn.exe 16 PID 2640 set thread context of 1268 2640 rundll32.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2616 lqhpvxmtbn.exe 2616 lqhpvxmtbn.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe 2640 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2224 lqhpvxmtbn.exe 2616 lqhpvxmtbn.exe 2616 lqhpvxmtbn.exe 2616 lqhpvxmtbn.exe 2640 rundll32.exe 2640 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2616 lqhpvxmtbn.exe Token: SeDebugPrivilege 2640 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2224 2188 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 28 PID 2188 wrote to memory of 2224 2188 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 28 PID 2188 wrote to memory of 2224 2188 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 28 PID 2188 wrote to memory of 2224 2188 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 28 PID 2224 wrote to memory of 2616 2224 lqhpvxmtbn.exe 29 PID 2224 wrote to memory of 2616 2224 lqhpvxmtbn.exe 29 PID 2224 wrote to memory of 2616 2224 lqhpvxmtbn.exe 29 PID 2224 wrote to memory of 2616 2224 lqhpvxmtbn.exe 29 PID 2224 wrote to memory of 2616 2224 lqhpvxmtbn.exe 29 PID 1268 wrote to memory of 2640 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2640 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2640 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2640 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2640 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2640 1268 Explorer.EXE 30 PID 1268 wrote to memory of 2640 1268 Explorer.EXE 30 PID 2640 wrote to memory of 2496 2640 rundll32.exe 31 PID 2640 wrote to memory of 2496 2640 rundll32.exe 31 PID 2640 wrote to memory of 2496 2640 rundll32.exe 31 PID 2640 wrote to memory of 2496 2640 rundll32.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"3⤵PID:2496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
205KB
MD5239f1ff96b0e979869e96c0b16b96196
SHA1870933b2120c8a592648524a56d8b3a81871b0fa
SHA256f60e2fb571c7a63cfe803c04c96afa011f04ff0767d78f1f10694ad96d017ea7
SHA5127e03d69fb7b1138c4226313249536b3ddb13374dae458b76c805919d03137dcd1c74fbfa1fad925c0e1dabaa9bf267701b6033485b9ed0620b2d7958bf8584f7
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d