Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
748646de2a6f09e35e043eefca32c6b8.exe
Resource
win7-20231215-en
General
-
Target
748646de2a6f09e35e043eefca32c6b8.exe
-
Size
872KB
-
MD5
748646de2a6f09e35e043eefca32c6b8
-
SHA1
0ba5a84af8177a4300bbb7f5be53c6401743a2b7
-
SHA256
30c70e6852155344b71c74dc919b365847a12ef299cda58501051f706e7bbbf4
-
SHA512
8fe83015475002e00b37f166338e987add93caec3ced3bfdf22e73c7e09469f98d109a2dbfa484ff19ca314e95e621bd508ee471d132597fa9b0e9e15919cc43
-
SSDEEP
12288:zmjdtAfZJoR65AXwgFvuSSUIomtXFu4wM2t3fEEIVwT4XBlm6tE1wJyafwLut:doR6qgcmhF4/3gSkXBlctafc
Malware Config
Extracted
formbook
4.1
wt5i
mydreamct.com
vadicore.com
choicemango.com
projectsolutionspro.com
ncg.xyz
goio.digital
ee-secure-account.com
criminalstudy.com
fsjuanzhi.com
pont-travaux-public.com
agencepartenaire.com
jlsyzm.com
prosselius.com
woodendgroups.com
thereproducts.site
sigmagrupo.net
chelseagracia.com
fusosstore.com
chrissypips.trade
mvlxplcswa.com
sneguard.com
travellingcomet.com
ledbydesign.asia
yaysondaj.com
recoverydharma.guide
peak8000.com
alltranslation.xyz
igorkozel.com
x-box2send.club
campgoodco.com
arrowinvestments-technology.com
naturally-preserved.com
vk-authorization.site
xn--12cfjb7d8dd4ftb6cr0g5e.net
losjazminesdelamolina.com
farmaciamoyatoledo134fmas.com
sgainme.com
corcoran.network
nestarchitectural.com
nnltsy.com
wyoming-interactive.net
laomao.site
qiwuwenhua.com
conectals.com
wanggou0579.com
nanmedia.info
kindredheatrsteam.com
passiveincomeincubator.com
eletroclimaks.com
getbackmode.com
clearvuetaxadvisors.com
pick-assiette.com
tribelinx.com
1bodymobile.com
united-for-humanity.net
hoatao.xyz
isbpestcontrol.com
nieght.com
pinoyhoustontv.com
bloochy.com
greatestpotever.com
onikidil.com
inspirainstitute.com
yourcariq.com
nouolive.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4068-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4844 set thread context of 4068 4844 748646de2a6f09e35e043eefca32c6b8.exe 97 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4844 748646de2a6f09e35e043eefca32c6b8.exe 4844 748646de2a6f09e35e043eefca32c6b8.exe 4068 748646de2a6f09e35e043eefca32c6b8.exe 4068 748646de2a6f09e35e043eefca32c6b8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4844 748646de2a6f09e35e043eefca32c6b8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4848 4844 748646de2a6f09e35e043eefca32c6b8.exe 96 PID 4844 wrote to memory of 4848 4844 748646de2a6f09e35e043eefca32c6b8.exe 96 PID 4844 wrote to memory of 4848 4844 748646de2a6f09e35e043eefca32c6b8.exe 96 PID 4844 wrote to memory of 4068 4844 748646de2a6f09e35e043eefca32c6b8.exe 97 PID 4844 wrote to memory of 4068 4844 748646de2a6f09e35e043eefca32c6b8.exe 97 PID 4844 wrote to memory of 4068 4844 748646de2a6f09e35e043eefca32c6b8.exe 97 PID 4844 wrote to memory of 4068 4844 748646de2a6f09e35e043eefca32c6b8.exe 97 PID 4844 wrote to memory of 4068 4844 748646de2a6f09e35e043eefca32c6b8.exe 97 PID 4844 wrote to memory of 4068 4844 748646de2a6f09e35e043eefca32c6b8.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\748646de2a6f09e35e043eefca32c6b8.exe"C:\Users\Admin\AppData\Local\Temp\748646de2a6f09e35e043eefca32c6b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\748646de2a6f09e35e043eefca32c6b8.exe"C:\Users\Admin\AppData\Local\Temp\748646de2a6f09e35e043eefca32c6b8.exe"2⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\748646de2a6f09e35e043eefca32c6b8.exe"C:\Users\Admin\AppData\Local\Temp\748646de2a6f09e35e043eefca32c6b8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-