Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
53ab34043d225c7fca168ad1a7df31a8.exe
Resource
win7-20231215-en
General
-
Target
53ab34043d225c7fca168ad1a7df31a8.exe
-
Size
1.3MB
-
MD5
53ab34043d225c7fca168ad1a7df31a8
-
SHA1
d65e76d0c79ac6270d3136af438bc36a69c7efc2
-
SHA256
657bd12172568c696ae02af0948808a0f9ab30d77ed199abd0f3bdf08f5d0513
-
SHA512
4a8e212fad1cb4047b83ec70f37cc136143341fb1c14cd6cd0908c7ded887acf65135a1adc105529ebee1fe239dbfb70fd3c999c7210693af989208a27328b82
-
SSDEEP
24576:Hg4fV76DOqfx8Dgyfx8Dg7qWpA2jPjvVpVbErWG1mwDZffL:pV76b58Dgy58Dg71A2jPjtrbtG7ZX
Malware Config
Extracted
formbook
4.1
amb6
segurocars.com
rylautosales.com
xinglinjiankang.com
dantil-brand.com
sofaloffa.club
coinclub2.com
ez-pens.com
gqtlqsw.com
robotnewswire.com
ktproductreviews.com
merchbrander.com
yesonamendmentb.com
losgatoslimos.com
kristincole.art
metalmaids.online
leftcoastmodels.com
athetheist.com
jblbusrtingsale.com
chungcugiarehcm.com
renblockchain.com
bigdaddy.fish
comproliverton.pro
gzmove.com
honeythymeherbfarm.com
davinescosmetics.com
9355693.com
movinmemphis901.com
patriotsrs.net
dagelijkseschoenen.com
a-want-ad.site
theodbox.com
audioky.net
hopematthewsrealtor.com
theonlinemoneymachine.com
misakiti.com
ad-yalong.com
mikealazo.com
marianoterra.com
shivorja.com
goodvibrationswindchimes.com
pecom-deliverry.online
amlexcel.com
emeralddrumcompany.com
dalipaella.com
shopcamacci.com
xucaiwujin.com
bxs5000.com
2en1institut.com
zxzm47-wj.com
builttek.com
66400yy.com
beegraze.com
thedottedcat.com
komsah.com
4202nsacramentoav.info
88q27.com
toriengenharia.com
briscoewelding.com
brookelenzi.com
tribaltrash.com
bidtas.com
shokhorror.com
bodurm.com
333.wiki
shopjempress.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3084-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5048 set thread context of 3084 5048 53ab34043d225c7fca168ad1a7df31a8.exe 102 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3084 53ab34043d225c7fca168ad1a7df31a8.exe 3084 53ab34043d225c7fca168ad1a7df31a8.exe 3084 53ab34043d225c7fca168ad1a7df31a8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3084 5048 53ab34043d225c7fca168ad1a7df31a8.exe 102 PID 5048 wrote to memory of 3084 5048 53ab34043d225c7fca168ad1a7df31a8.exe 102 PID 5048 wrote to memory of 3084 5048 53ab34043d225c7fca168ad1a7df31a8.exe 102 PID 5048 wrote to memory of 3084 5048 53ab34043d225c7fca168ad1a7df31a8.exe 102 PID 5048 wrote to memory of 3084 5048 53ab34043d225c7fca168ad1a7df31a8.exe 102 PID 5048 wrote to memory of 3084 5048 53ab34043d225c7fca168ad1a7df31a8.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\53ab34043d225c7fca168ad1a7df31a8.exe"C:\Users\Admin\AppData\Local\Temp\53ab34043d225c7fca168ad1a7df31a8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\53ab34043d225c7fca168ad1a7df31a8.exe"C:\Users\Admin\AppData\Local\Temp\53ab34043d225c7fca168ad1a7df31a8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-