Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
070989d8cda0d6a7c06bef08e202e65f.exe
Resource
win7-20231215-en
General
-
Target
070989d8cda0d6a7c06bef08e202e65f.exe
-
Size
1.1MB
-
MD5
070989d8cda0d6a7c06bef08e202e65f
-
SHA1
55f401ece369ead31ab4bcddabd27dda579034fb
-
SHA256
0900fb79f837569ff852f6ed371c42e4a4c7f4b39ca68913a53108cc86fb98b9
-
SHA512
1fab3030e2f2ff05bc681a593c788e16201ce779baa2420c0d469cf1cbcdb9e46d916104890ccaf7a66d4b3f9693ed6e3550e38ce4486591b374a162156a98b0
-
SSDEEP
24576:MhBmZH5/darK64JWe+fhD3noq5RZq/IL:MLKKK64Jkfh7noqXZ8
Malware Config
Extracted
formbook
4.1
k2m6
olamenfox.com
sisuidrottmassage.info
de-mayoreo.com
jpmorgancoin.online
gorkasantosarquitectura.com
musicandsound.pro
sarahprworldwide.com
mediclaim.store
chipnoodle.com
creditccu.com
glowyfryzjerskie.com
spoutte.com
cinemaflix.download
tahviehsafir.com
wandabooks.com
crossbowbroadhead.com
kn3257pkty.site
gigabytebd.com
hotel-alameda-zarautz.com
meguina.com
m79.pw
etiennebolducluthier.com
binarysystem.asia
wecancelculture.com
redeem-release.com
ahxbqp.com
smarttampico.com
ess.xyz
nollettan.com
8794379.com
bxgyqc.com
letbee.net
gustodeals.com
fresh4chef.com
classicwood786.com
bsociallaw.com
7pstudios.com
nav701.xyz
mishmashpotatosmash.com
amozeshpazhohi.com
neoapp.space
chikacha.com
vikarky.online
elmolitours.com
ksaprop.net
jokysun.com
tr-hpservis.com
transbili.com
6501333.com
tanzlaufen.net
ydobno.net
ottotrd.com
customcowgirlthreads.com
princessstreeteast.com
financeassetrecovery.com
marabierta-coaching.com
mathsforallbydkd.com
fmusico.com
wickedawesomelawns.com
yiliclean.com
koyakojima.com
xellancehairstudios.com
ammostack.com
typebender.net
japanese-made.net
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1064-3-0x0000000000310000-0x0000000000322000-memory.dmp CustAttr -
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1920-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1064 set thread context of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1920 070989d8cda0d6a7c06bef08e202e65f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30 PID 1064 wrote to memory of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30 PID 1064 wrote to memory of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30 PID 1064 wrote to memory of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30 PID 1064 wrote to memory of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30 PID 1064 wrote to memory of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30 PID 1064 wrote to memory of 1920 1064 070989d8cda0d6a7c06bef08e202e65f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-