Analysis
-
max time kernel
140s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe
Resource
win7-20240221-en
General
-
Target
2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe
-
Size
690KB
-
MD5
3da716e7be62ce9f345c37c84fff8ed9
-
SHA1
aa92605e8ffa40546407975c7f50f3abe7e3fa67
-
SHA256
2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625
-
SHA512
4dfbe7ef693202ae81d8092259493c4c6374f0c55e6dd4a6fa10b52297f0287f2d75d96930cddb0f786c1b31e29c24e6601cb08942fb80c60ded5f7a87a60230
-
SSDEEP
12288:izNwnqs3y44sAGcprVjQSwMQTKilCj5If71Fs0576ivpVA5wN8wWEACrIYgI:HnPAGcpx5wMKPwC1Fsc76iv7BiC1gI
Malware Config
Extracted
formbook
4.1
he2a
connectioncompass.store
zekicharge.com
dp77.shop
guninfo.guru
mamaeconomics.net
narcisme.coach
redtopassociates.com
ezezn.com
theoregondog.com
pagosmultired.online
emsculptcenterofne.com
meet-friends.online
pf326.com
wealthjigsaw.xyz
arsajib.com
kickassholdings.online
avaturre.biz
dtslogs.com
lb92.tech
pittalam.com
cyberlegion.group
24eu-ru-startup.xyz
theaustralianbrisketboard.com
bavrnimn.site
xn--groupe-gorg-lbb.com
hg08139.com
myjbtest.net
cyg8wm3zfb.xyz
mimi2023.monster
ruixiangg.com
smokintires.net
out-boundlabs.net
matrix-promotions.com
botfolk.com
6o20r.beauty
cpohlelaw.com
zamupoi.fun
eletrobrasilvendas.com
desire-dating.com
678ap.com
bioprost.club
hfaer4.xyz
yuwangjing.com
359brigham.com
misstamar.mobi
lucasbrownviolinstudio.com
mybet668.com
giuila.online
mathews.buzz
dcmdot.com
epeople.store
totneshotdesk.com
jaehub.com
notbokin.online
trongiv.xyz
adept-expert-comptable.net
4tvaccounting.com
saledotfate.live
canadiantrafficmanagement.net
oktravelhi.com
taylorranchtrail.com
tempahwebsites.com
b-store.shop
paintellensburg.com
qfs-capital.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1204-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1692 set thread context of 1204 1692 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 102 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1204 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 1204 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 1204 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1204 1692 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 102 PID 1692 wrote to memory of 1204 1692 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 102 PID 1692 wrote to memory of 1204 1692 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 102 PID 1692 wrote to memory of 1204 1692 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 102 PID 1692 wrote to memory of 1204 1692 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 102 PID 1692 wrote to memory of 1204 1692 2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe"C:\Users\Admin\AppData\Local\Temp\2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe"C:\Users\Admin\AppData\Local\Temp\2d450cf09b7158d5036e1e8572f9b0327d70670f0238ff963cad00aeb9020625.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:264