Analysis
-
max time kernel
152s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
03be8348a96b6dfd7f9e2e9cf774158a.exe
Resource
win7-20231215-en
General
-
Target
03be8348a96b6dfd7f9e2e9cf774158a.exe
-
Size
1.3MB
-
MD5
03be8348a96b6dfd7f9e2e9cf774158a
-
SHA1
36001e5d587b70f594a38c0d45bb9e17d210f697
-
SHA256
5aac852c4f4d5626dae1b8412fc965cc50e349389cadfd512b0f641dbef21b93
-
SHA512
b11fcf14a4e9b31397156c509afcb9f28c307a6de89e640c574d5848c14e2e46de7fd7c516e558e991b2ded125f4e80171a49e359d7ddfe5bcbffe00319582db
-
SSDEEP
24576:4fOsBgo0q4wMXBmCmTOUd+L6k1XWaIboHqPU7JFFaBczogDdK:4WoHMRmCm6Ud+z1X3YoHqs7JFQcLd
Malware Config
Extracted
formbook
4.1
u6ep
kristinaandmatt2021.com
ankergreen.com
portaldoinvocador.com
artisticdancecompanyct.com
clarkson-craik-wedding.com
ourparentsaspartners.net
insuranceservicesfl.com
erxia29.com
thelogicsticks.com
silversteel-ye.com
risingstrenghtscounseling.com
psm-gen.com
katsworlds.com
manayi-matnayen.com
itsgrind30.com
punebites.com
dwkjkvsa.icu
gallucciowineries.com
rogerzhou.com
teamwork256.com
fcknloveit.com
elestampado.com
scootersfornewbies.com
uni-star-cn.com
966938.com
wonderancientswiftvibrancy.com
czflsp.com
grocerygurunicole.com
qyaswryhk.icu
tomslandscaping.net
lagboni.com
angelacontreras.design
the694.com
clubfit24virtual.com
zsesfw.com
tramomed.com
hypo-realitni-servis.online
damselindior.site
stagdotenerife.com
sunlightjoinery.com
ampsportshouston.com
erotikazdarma-na-seznamu.online
paksfjphkqpfgoldenhpaksfpnh.net
quisiweb.com
nicholasvilleguttercleaning.com
monekigames.com
veranev.com
papagle.com
012997.com
ruiyiknit.com
thearticclaw.com
jacobmantle.com
auntiebsbread.com
torontoescortlist.com
thedemocratads.com
dwysll.com
weskunmgrf.com
motionmediamail.com
mybirthpillow.com
adaptiveclick.com
wetechy.com
redeftco.com
isaandfriendsfoundationcorp.com
venti50.com
zidesign.xyz
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3684-8-0x0000000005970000-0x0000000005982000-memory.dmp CustAttr -
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4432-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3684 set thread context of 4432 3684 03be8348a96b6dfd7f9e2e9cf774158a.exe 107 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4432 03be8348a96b6dfd7f9e2e9cf774158a.exe 4432 03be8348a96b6dfd7f9e2e9cf774158a.exe 4432 03be8348a96b6dfd7f9e2e9cf774158a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3684 wrote to memory of 4432 3684 03be8348a96b6dfd7f9e2e9cf774158a.exe 107 PID 3684 wrote to memory of 4432 3684 03be8348a96b6dfd7f9e2e9cf774158a.exe 107 PID 3684 wrote to memory of 4432 3684 03be8348a96b6dfd7f9e2e9cf774158a.exe 107 PID 3684 wrote to memory of 4432 3684 03be8348a96b6dfd7f9e2e9cf774158a.exe 107 PID 3684 wrote to memory of 4432 3684 03be8348a96b6dfd7f9e2e9cf774158a.exe 107 PID 3684 wrote to memory of 4432 3684 03be8348a96b6dfd7f9e2e9cf774158a.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe"C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe"C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-