Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
070989d8cda0d6a7c06bef08e202e65f.exe
Resource
win7-20231215-en
General
-
Target
070989d8cda0d6a7c06bef08e202e65f.exe
-
Size
1.1MB
-
MD5
070989d8cda0d6a7c06bef08e202e65f
-
SHA1
55f401ece369ead31ab4bcddabd27dda579034fb
-
SHA256
0900fb79f837569ff852f6ed371c42e4a4c7f4b39ca68913a53108cc86fb98b9
-
SHA512
1fab3030e2f2ff05bc681a593c788e16201ce779baa2420c0d469cf1cbcdb9e46d916104890ccaf7a66d4b3f9693ed6e3550e38ce4486591b374a162156a98b0
-
SSDEEP
24576:MhBmZH5/darK64JWe+fhD3noq5RZq/IL:MLKKK64Jkfh7noqXZ8
Malware Config
Extracted
formbook
4.1
k2m6
olamenfox.com
sisuidrottmassage.info
de-mayoreo.com
jpmorgancoin.online
gorkasantosarquitectura.com
musicandsound.pro
sarahprworldwide.com
mediclaim.store
chipnoodle.com
creditccu.com
glowyfryzjerskie.com
spoutte.com
cinemaflix.download
tahviehsafir.com
wandabooks.com
crossbowbroadhead.com
kn3257pkty.site
gigabytebd.com
hotel-alameda-zarautz.com
meguina.com
m79.pw
etiennebolducluthier.com
binarysystem.asia
wecancelculture.com
redeem-release.com
ahxbqp.com
smarttampico.com
ess.xyz
nollettan.com
8794379.com
bxgyqc.com
letbee.net
gustodeals.com
fresh4chef.com
classicwood786.com
bsociallaw.com
7pstudios.com
nav701.xyz
mishmashpotatosmash.com
amozeshpazhohi.com
neoapp.space
chikacha.com
vikarky.online
elmolitours.com
ksaprop.net
jokysun.com
tr-hpservis.com
transbili.com
6501333.com
tanzlaufen.net
ydobno.net
ottotrd.com
customcowgirlthreads.com
princessstreeteast.com
financeassetrecovery.com
marabierta-coaching.com
mathsforallbydkd.com
fmusico.com
wickedawesomelawns.com
yiliclean.com
koyakojima.com
xellancehairstudios.com
ammostack.com
typebender.net
japanese-made.net
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3744-8-0x0000000005430000-0x0000000005442000-memory.dmp CustAttr -
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2240-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3744 set thread context of 2240 3744 070989d8cda0d6a7c06bef08e202e65f.exe 102 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3744 070989d8cda0d6a7c06bef08e202e65f.exe 3744 070989d8cda0d6a7c06bef08e202e65f.exe 2240 070989d8cda0d6a7c06bef08e202e65f.exe 2240 070989d8cda0d6a7c06bef08e202e65f.exe 2240 070989d8cda0d6a7c06bef08e202e65f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3744 070989d8cda0d6a7c06bef08e202e65f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3744 wrote to memory of 2240 3744 070989d8cda0d6a7c06bef08e202e65f.exe 102 PID 3744 wrote to memory of 2240 3744 070989d8cda0d6a7c06bef08e202e65f.exe 102 PID 3744 wrote to memory of 2240 3744 070989d8cda0d6a7c06bef08e202e65f.exe 102 PID 3744 wrote to memory of 2240 3744 070989d8cda0d6a7c06bef08e202e65f.exe 102 PID 3744 wrote to memory of 2240 3744 070989d8cda0d6a7c06bef08e202e65f.exe 102 PID 3744 wrote to memory of 2240 3744 070989d8cda0d6a7c06bef08e202e65f.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"C:\Users\Admin\AppData\Local\Temp\070989d8cda0d6a7c06bef08e202e65f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-