Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
110142e8d152faac7f40309a52d71532.exe
Resource
win7-20231215-en
General
-
Target
110142e8d152faac7f40309a52d71532.exe
-
Size
739KB
-
MD5
110142e8d152faac7f40309a52d71532
-
SHA1
b3fd224110c7458238342dee5db36173bc46ee95
-
SHA256
051cd19f3c86a89752298ea78c9c776a355370e3e8da1d69585d0c8afb65142f
-
SHA512
f553f58bc8651ecdbd1d3c79335c3f0c4f8c27f583ff91545f54bd4c0ff9956fba952aed0c02fee2c19b5eaa7d9bc8a7897c2db7aaae3b0f895eaa921d87c50d
-
SSDEEP
12288:h6T33fmgQJKcmDl5dZnMCDznwmsIVtCGQEu:h6T+3mDl
Malware Config
Extracted
formbook
4.1
gt4l
livewithangelavaladez.xyz
pdla1oorf7.com
edroi.com
prysodt.xyz
yacht-chi7-sanlorenzo.com
worenocy.com
sprayfoamsave.com
felipelourenco.online
thisnthatpaithailand.com
troyl.ink
apptohealth.com
colectivasolar.net
gljsbq.com
futsunoossan.com
fairmountuniversity.com
schaff-smart-solutions.gmbh
releasingpro.com
katiescarlettartist.com
netskopesecurity.com
erfdj.net
venturedi.com
evergreenstatenisland.com
alkadira.com
ellawortmann.com
tampamalpracticelawyers.com
secretgermanjodrl.com
hss-japan.com
theliberators.online
shihtzudynastystuds.com
covidvaccineinjurylawyer.net
yzhouse.xyz
tovarhit.xyz
server114.xyz
fargosupport.online
coolibri.net
positivepsychologypress.com
americanagirls.com
retaillinkexchange.com
jzjierui.com
firehouselive.com
goldenwingtransports.com
fujitsu-development.com
icarecase.com
jewsaidit.com
beritapurwakarta.com
bearhelvetet.com
mari-vis-olive-n.com
shzwzkl.com
siouxempireplaytherapy.com
mefacin.online
iimak-armorasia.com
rushvalidator.com
lizwennerzmzuofpojtun.com
twinsrose.com
based.network
https882ys2.xyz
xingyaplasticpipe.com
focusonfriends.com
onlycollab.com
yaygmu.com
diproserspa.com
mineria-technologies.com
projokar.com
jokesouo.com
dlsair.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3800-5-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3480 set thread context of 3800 3480 110142e8d152faac7f40309a52d71532.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3800 110142e8d152faac7f40309a52d71532.exe 3800 110142e8d152faac7f40309a52d71532.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3800 3480 110142e8d152faac7f40309a52d71532.exe 93 PID 3480 wrote to memory of 3800 3480 110142e8d152faac7f40309a52d71532.exe 93 PID 3480 wrote to memory of 3800 3480 110142e8d152faac7f40309a52d71532.exe 93 PID 3480 wrote to memory of 3800 3480 110142e8d152faac7f40309a52d71532.exe 93 PID 3480 wrote to memory of 3800 3480 110142e8d152faac7f40309a52d71532.exe 93 PID 3480 wrote to memory of 3800 3480 110142e8d152faac7f40309a52d71532.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\110142e8d152faac7f40309a52d71532.exe"C:\Users\Admin\AppData\Local\Temp\110142e8d152faac7f40309a52d71532.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\110142e8d152faac7f40309a52d71532.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-