Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2023 21:44
Static task
static1
Behavioral task
behavioral1
Sample
6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe
Resource
win7-20231020-en
General
-
Target
6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe
-
Size
575KB
-
MD5
d400c125c91f0da96b71a1335d5c7e9e
-
SHA1
c5cadd640c60cc5ae5377fa8726c15f38808a131
-
SHA256
6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7db
-
SHA512
8d77dc100e939fd72e3036307883584af47c35298e049fbc3c92cfb94c4a782180ff0a5c5148d72e4f2e39d6208c9237f65b1f6488e5bfa31cca5c30c0ffbf2f
-
SSDEEP
12288:nE+RIimQdL6iHOHpF2hJwy+atu6KVC94MVK4ENzZK:nE+evGOHpKavI4YEN
Malware Config
Extracted
formbook
4.1
cc73
viptop77.biz
sell-home-fast-for-cash.xyz
wjbwebsite.top
ceramic.house
anthologymotors.com
acctwiseconsulting.com
xn--bj4blri6mqqan64b.com
roguester.com
blavkimped.com
mostbet-wih8.xyz
biellacapital.com
jasonmoorehead.online
wolrdtenis.com
huahuiblog.com
jonniprince.com
gohanyo.com
l4-j2.pro
coinyeard.com
fh8019.com
iltorlonia.com
themobilefinder.com
taipush.com
qlw3wm.top
akersbusinesslaw.com
imluodiyue.com
niok-blase.top
palmettobaynews.com
brothers-style.com
zg9tywlubmftzw5ldze3njm.com
amihad.company
zaymnokpo.online
rabbit-tantei.site
oncologyphotos.com
aqdydep.com
kt8mx41vvk0gp4f.xyz
bushypussypi.com
kishanobd.com
amazonva.info
poker-dewa88.com
exhibit-t.com
10923.top
doneforyouph.com
topantisnoringdevice.com
gwf952.com
hjnnhhyyu.com
120bahis1000.com
niloticus.com
spitzpr-fu.info
3gmosoft.com
datalinkstore.com
crossidea.net
qplezamczb.com
h3b8c.com
wtjtv5.cyou
tizusano.com
audreydeshetler.com
deutschebankcredits.com
tanpabatas16.click
amegjenerator.com
smnrx.com
hh-brilliance.com
bixas.xyz
krebls.com
pharmacogeneticsreviews.com
ribbon-555.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3872-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 220 set thread context of 3872 220 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3872 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 3872 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 220 wrote to memory of 3872 220 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 93 PID 220 wrote to memory of 3872 220 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 93 PID 220 wrote to memory of 3872 220 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 93 PID 220 wrote to memory of 3872 220 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 93 PID 220 wrote to memory of 3872 220 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 93 PID 220 wrote to memory of 3872 220 6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe"C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe"C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-