Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
df47fa42103603f654eeecd807f6238d.exe
Resource
win7-20240319-en
General
-
Target
df47fa42103603f654eeecd807f6238d.exe
-
Size
742KB
-
MD5
df47fa42103603f654eeecd807f6238d
-
SHA1
c6c976bb06d92279242081c0545517c94628e3a8
-
SHA256
e0e30c8c2180ba5b019bb78098a25811a1989a1bc6809e4c17130d887c47a24e
-
SHA512
a3d21ae1b99fb5893c8232f2a3cfdfadb1e7a0345247e56f8591b5d9772e12bf66bf9bc816123c6179c6bd07d6ac265152f70e0e017934289c50fd25587d5d52
-
SSDEEP
12288:Fnq/cgomhNFmqk3sPpXoO7hS1t9oJ9OlBk2qvRrB9l9X:zgLKySYhWtuwBktprB9l
Malware Config
Extracted
formbook
4.1
ucze
motorcyclemagician.com
powerreport.xyz
ychfgdne.icu
presentschein.com
seabreathing.com
stlukeyouth.com
ifixconstruction.repair
thietbikhaithacdatuanphat.com
hexdeville.com
xn--planungsbro-stanko-u6b.net
elisebruneau.com
yxflwwbvz.icu
wafirainteriors.com
hexok.com
krewedubethkevin.com
lassilacgi.com
bestvolvowebsite.com
clarissajaneen.com
foreverchemicallawsuit.com
ebizkendra.com
paypalticket4297750.info
safehandmarketing.com
zrd.xyz
apaiald.com
showpiececreations.com
banvasuckhoe.xyz
electricianlowerhutt.kiwi
happybirthdayonyourspecial.date
chicagofarmacy.com
jobtron.net
davesbadtrip.com
e-franchisepro.com
philidelphiaflyers.com
daveleadesigns.com
thetizercompany.com
5xge9yf2nbui1pq7c300.online
masqboutique.com
notonghehighstreet.com
europeantechnology.online
sitesfazendoecomm.com
imperial-tg.com
sprintsolution.net
joyeriaguitzel.com
stacod.com
sachi-eganosyo.com
zakkasolci.xyz
bsekino.com
ashevillebrewbites.com
breastfriendsfornow.com
01yes.company
thewitless.com
chathansannidhi.com
vectorstratos.com
migranreceta.info
fomosimo.com
digiswasth.com
justicefordreasjonreed.com
jesuslickingchrist.com
shaggyyack.com
sneakerbox.supply
fruitopsllc.com
judialor.com
revayat.info
ciaslo02.com
suavit.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1564-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3308 set thread context of 1564 3308 df47fa42103603f654eeecd807f6238d.exe 101 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1564 df47fa42103603f654eeecd807f6238d.exe 1564 df47fa42103603f654eeecd807f6238d.exe 1564 df47fa42103603f654eeecd807f6238d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3308 wrote to memory of 1564 3308 df47fa42103603f654eeecd807f6238d.exe 101 PID 3308 wrote to memory of 1564 3308 df47fa42103603f654eeecd807f6238d.exe 101 PID 3308 wrote to memory of 1564 3308 df47fa42103603f654eeecd807f6238d.exe 101 PID 3308 wrote to memory of 1564 3308 df47fa42103603f654eeecd807f6238d.exe 101 PID 3308 wrote to memory of 1564 3308 df47fa42103603f654eeecd807f6238d.exe 101 PID 3308 wrote to memory of 1564 3308 df47fa42103603f654eeecd807f6238d.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\df47fa42103603f654eeecd807f6238d.exe"C:\Users\Admin\AppData\Local\Temp\df47fa42103603f654eeecd807f6238d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\df47fa42103603f654eeecd807f6238d.exe"C:\Users\Admin\AppData\Local\Temp\df47fa42103603f654eeecd807f6238d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-