Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 22:42
Static task
static1
Behavioral task
behavioral1
Sample
410f4617026b9c0bc7296999d4028a86.exe
Resource
win7-20231215-en
General
-
Target
410f4617026b9c0bc7296999d4028a86.exe
-
Size
1.3MB
-
MD5
410f4617026b9c0bc7296999d4028a86
-
SHA1
6f558885e1901d89a067619c5e46e642fdd29a7c
-
SHA256
c9c2270688cf2f657dc16c1399cfbebadb1ae1d9a14c575a8f0c9d4c1ee3f38d
-
SHA512
09cb0893935fbd733f40d86fc76420cc7292758887e8f1e37e01eb032741bb94394158cdfda9ac7142c24f39c2c79ea405cd921f02d94f712eac623117c853d9
-
SSDEEP
24576:2RS/d3NKzksGkszrBpGSDTZSK2Z/dgrBEvqQy8jhMN6ZNZZ:TKYlnTZSK2ZSS3CN6ZNZ
Malware Config
Extracted
formbook
4.1
rh0s
operatethekitchen.com
albaturkvatifbank.com
buzduganjr.com
binnsmotorinn.com
slotz789.com
bbwelldrilling.com
ldygqr.com
copyrightrules-ig.com
grabnsnatch.net
snowboardworldcup2009.com
mkstarz.com
flattoplakehomesforsale.com
tradinglife123.net
cafearabicanj.com
thekozow.com
wii2review26.club
youcanpassusmle.com
tydevelops.com
fashionwatchesstore.com
peeleasubo.com
8boldsouls.com
carolinecrosbie.com
proveyouwrong.com
amarokhouston.com
gpssee.net
mymeditation-mask.com
fujisetsu.com
nijafoodiegrill.com
wwwwlf.com
gadgetwoods.com
amarportal.com
papelonlavapies.com
gatsys.cloud
trail.energy
sanchezfinancebrokers.com
itfacingthegiants.com
tirupatipropertys.com
elitebookies.com
mixuler.com
unifi.group
protradeco.com
whatsafter60.com
glentunbridge.com
zs621.com
lifeatrockbottom.com
doctorsdietgulfport.com
valengz.com
mgm8888m.com
drone-apace.website
suplementosnutricionales.info
bolohopl.com
hollyjocelyn.net
perfectingtimelessskin.com
linkcapitalhumano.com
classifiedadsqatar.com
build-your-credit-used-cars.com
cyrdigitalservices.com
sadaegilgit.com
toolsofthetradestore.com
psapancenter.com
gjbqyvzp.com
zuz.xyz
towerclaimsadjusters.com
pruetbrz.icu
totaloffice-alaska.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/936-3-0x0000000000260000-0x0000000000272000-memory.dmp CustAttr -
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2576-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 936 set thread context of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2576 410f4617026b9c0bc7296999d4028a86.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 936 wrote to memory of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30 PID 936 wrote to memory of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30 PID 936 wrote to memory of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30 PID 936 wrote to memory of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30 PID 936 wrote to memory of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30 PID 936 wrote to memory of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30 PID 936 wrote to memory of 2576 936 410f4617026b9c0bc7296999d4028a86.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\410f4617026b9c0bc7296999d4028a86.exe"C:\Users\Admin\AppData\Local\Temp\410f4617026b9c0bc7296999d4028a86.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\410f4617026b9c0bc7296999d4028a86.exe"C:\Users\Admin\AppData\Local\Temp\410f4617026b9c0bc7296999d4028a86.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-