Analysis
-
max time kernel
147s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
449b3fa96d0f05b8e8663fd8472d366d.exe
Resource
win7-20231215-en
General
-
Target
449b3fa96d0f05b8e8663fd8472d366d.exe
-
Size
1.2MB
-
MD5
449b3fa96d0f05b8e8663fd8472d366d
-
SHA1
40c2e2aca926851e0100816869d349597c0e7649
-
SHA256
0a718870a86c1437e0299f0a1aaeb8f86dfe8af43e4ab56812ad127c56b876dd
-
SHA512
8aca4dd5a5a4084d2eee490aa8456bfe50594e166bf6eccf27a1c7c0b8b60481bfa1a42217445e2b2c61ce52d3482b79c57aa21a30c8d0ee0b9480ed536e6b57
-
SSDEEP
24576:lYHlCmmeOsBgo0q4wMugVZZOT+QorTkgzx:lVnoHMuY7UoPkgz
Malware Config
Extracted
formbook
4.1
abns
velocityengineering.info
kenzkreashunz.com
sinsemillasweets.com
digitalnetworkslocal.com
thegalomedia.com
hbgangrui.com
tomatoslim.com
stackserviceplatform.com
ushemper.com
pj569330.com
onpointbr.com
anamhashim.com
merci-love.com
hashicup.com
sc-tjlm.com
jokysun.com
cfsandcreativity.com
tshirtmogul.net
emc-biotec.com
gifterias.com
lexireign.com
virtualppo.com
literarypalimpsest.com
coolinterestingg.site
patiochess.com
straightplug.com
colapatrend.com
clupprol.com
eternalorgonite.com
floraandflux.com
rohinibiocare.com
b2bhub.xyz
cktemizliksiteyonetimi.com
crystalizedenlightenment.com
runalp-tennis.com
saveyourshells.com
blessdressclothing.com
silenziatore.club
kuaizhifu.club
dighype.com
cixian666.com
liucms.com
njjy88.com
designerstucson.com
simplehjman.com
phs.xyz
sellcarforcashomaha.com
fhss180.com
couldshould.com
thefirstoath.com
relationnet.com
honzawa-shika.net
tnphost.net
clutchaffair.com
omemegle.com
huiyangsj.com
ciernes.com
nailmailed.com
showreel.info
weststreetsports.com
thedashnyc.com
newjerseyhemorrhoidclinic.com
ikyu-mundodigital.com
yesimofluoglu.com
neighborhoodfaith.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/508-8-0x0000000002D00000-0x0000000002D12000-memory.dmp CustAttr -
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2640-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 508 set thread context of 2640 508 449b3fa96d0f05b8e8663fd8472d366d.exe 102 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 508 449b3fa96d0f05b8e8663fd8472d366d.exe 508 449b3fa96d0f05b8e8663fd8472d366d.exe 2640 449b3fa96d0f05b8e8663fd8472d366d.exe 2640 449b3fa96d0f05b8e8663fd8472d366d.exe 2640 449b3fa96d0f05b8e8663fd8472d366d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 508 449b3fa96d0f05b8e8663fd8472d366d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 508 wrote to memory of 2640 508 449b3fa96d0f05b8e8663fd8472d366d.exe 102 PID 508 wrote to memory of 2640 508 449b3fa96d0f05b8e8663fd8472d366d.exe 102 PID 508 wrote to memory of 2640 508 449b3fa96d0f05b8e8663fd8472d366d.exe 102 PID 508 wrote to memory of 2640 508 449b3fa96d0f05b8e8663fd8472d366d.exe 102 PID 508 wrote to memory of 2640 508 449b3fa96d0f05b8e8663fd8472d366d.exe 102 PID 508 wrote to memory of 2640 508 449b3fa96d0f05b8e8663fd8472d366d.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\449b3fa96d0f05b8e8663fd8472d366d.exe"C:\Users\Admin\AppData\Local\Temp\449b3fa96d0f05b8e8663fd8472d366d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\449b3fa96d0f05b8e8663fd8472d366d.exe"C:\Users\Admin\AppData\Local\Temp\449b3fa96d0f05b8e8663fd8472d366d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-