Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
7885d083cda2b5be4bfd33eaf138a9df.exe
Resource
win7-20231215-en
General
-
Target
7885d083cda2b5be4bfd33eaf138a9df.exe
-
Size
806KB
-
MD5
7885d083cda2b5be4bfd33eaf138a9df
-
SHA1
e8a131256dcc6b616203e43d54f561016e31c5b2
-
SHA256
e8815d23a30784440c043d16e0b62dfd5107c68f7139075b947575fee940a651
-
SHA512
91fe35e58039214914eb30fd233261844fff46e39764cafdfa47a8dc17980cb5219d56c4c4c1d9b8bfcd83c7271f496c3c36443224a6ede89f85bc9668c33f08
-
SSDEEP
12288:RSuXry7iS/d348plpPVTfaropWnLOciYbJiH6fRMxrYxDERYvXNt:Rtr9S/d3PVaoKZiY2IemJEoNt
Malware Config
Extracted
formbook
4.1
fndy
nerorog.com
gsdyqf.com
spyxcase.com
wassyoiseikatsu.net
binarytotext.online
conflictdynamicsprofile.com
forepast.com
raleighproduction.com
icqbet.net
applesgravity.com
lasmargsdenver.com
wordspanpublishing.com
sozialmediamarekting.com
sanaulahmalik.com
trufflesales.com
rajakreditmobil.com
remoteandfreelance.com
sunny-since-we-met.net
heloisecommunication.com
theatreimagination.com
hhxcaxxb.icu
adkcontrol.com
yodhaka.com
movingswap.com
wangxiao.space
fullfuckit.com
growtheartclub.com
citizensofsketch.com
nieght.com
alidesiro.com
theholisticoracle.com
skprojectmanagement.com
alyanna.design
stonebahis34.com
asm-chambourcy.com
calculatorcarpayment.com
andyskumanich.com
eshopmarty.com
factoka.com
anshujaat.com
latinconexiontv.com
fredericobertan.com
b2bexcellence.com
diprachan.com
hiltonhead.travel
recoveryking.store
portcreditmacarons.com
tempusdoors.com
aussiecasinogames.com
prestonhollowaesthetics.com
coreyconners.com
infinitybytg.com
scionoflewisville.com
redhotdomains4sale.com
mybabynamessite.com
marcoleather.com
indoortheater.com
endeavouroneusa.com
bjjgkz.com
habaner-oh.com
brandlshop.com
fowlermartin.net
atlantic-lion-investments.com
trendingempresarial.com
premierhomebuild.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2028-3-0x00000000001D0000-0x00000000001E2000-memory.dmp CustAttr -
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2736-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2736 7885d083cda2b5be4bfd33eaf138a9df.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30 PID 2028 wrote to memory of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30 PID 2028 wrote to memory of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30 PID 2028 wrote to memory of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30 PID 2028 wrote to memory of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30 PID 2028 wrote to memory of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30 PID 2028 wrote to memory of 2736 2028 7885d083cda2b5be4bfd33eaf138a9df.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7885d083cda2b5be4bfd33eaf138a9df.exe"C:\Users\Admin\AppData\Local\Temp\7885d083cda2b5be4bfd33eaf138a9df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7885d083cda2b5be4bfd33eaf138a9df.exe"C:\Users\Admin\AppData\Local\Temp\7885d083cda2b5be4bfd33eaf138a9df.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-