Analysis
-
max time kernel
124s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe
Resource
win7-20240215-en
General
-
Target
4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe
-
Size
721KB
-
MD5
dfafc703ba16fa2dd6989169eea78527
-
SHA1
80af23bb93aac46677909f7275d0afe05af2ed57
-
SHA256
4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9
-
SHA512
5c60b5033df256b8e6627d1313e606435a74daeae8cd449131df6293ba2f12da1ef6358257165bc470f29fc8b6004dbe963131584ab17e73d1378f4faec7cb92
-
SSDEEP
12288:lOJ67iJqP9XRz+5EJqOYu0iQVROhjuAZsKelXXex87+2LzBh3:lOJ67iJqPpRz+yJqK0bVwhjuBFex8i2P
Malware Config
Extracted
formbook
4.1
he2a
connectioncompass.store
zekicharge.com
dp77.shop
guninfo.guru
mamaeconomics.net
narcisme.coach
redtopassociates.com
ezezn.com
theoregondog.com
pagosmultired.online
emsculptcenterofne.com
meet-friends.online
pf326.com
wealthjigsaw.xyz
arsajib.com
kickassholdings.online
avaturre.biz
dtslogs.com
lb92.tech
pittalam.com
cyberlegion.group
24eu-ru-startup.xyz
theaustralianbrisketboard.com
bavrnimn.site
xn--groupe-gorg-lbb.com
hg08139.com
myjbtest.net
cyg8wm3zfb.xyz
mimi2023.monster
ruixiangg.com
smokintires.net
out-boundlabs.net
matrix-promotions.com
botfolk.com
6o20r.beauty
cpohlelaw.com
zamupoi.fun
eletrobrasilvendas.com
desire-dating.com
678ap.com
bioprost.club
hfaer4.xyz
yuwangjing.com
359brigham.com
misstamar.mobi
lucasbrownviolinstudio.com
mybet668.com
giuila.online
mathews.buzz
dcmdot.com
epeople.store
totneshotdesk.com
jaehub.com
notbokin.online
trongiv.xyz
adept-expert-comptable.net
4tvaccounting.com
saledotfate.live
canadiantrafficmanagement.net
oktravelhi.com
taylorranchtrail.com
tempahwebsites.com
b-store.shop
paintellensburg.com
qfs-capital.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/824-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exedescription pid process target process PID 3472 set thread context of 824 3472 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exepid process 824 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 824 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exedescription pid process target process PID 3472 wrote to memory of 824 3472 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe PID 3472 wrote to memory of 824 3472 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe PID 3472 wrote to memory of 824 3472 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe PID 3472 wrote to memory of 824 3472 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe PID 3472 wrote to memory of 824 3472 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe PID 3472 wrote to memory of 824 3472 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe 4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe"C:\Users\Admin\AppData\Local\Temp\4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe"C:\Users\Admin\AppData\Local\Temp\4c8efb2c7d2516b6253a3008e5f4dd5a0efb6b9752c76642491d9f6bfd9df6d9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/824-11-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/824-14-0x00000000013E0000-0x000000000172A000-memory.dmpFilesize
3.3MB
-
memory/3472-6-0x00000000056F0000-0x000000000578C000-memory.dmpFilesize
624KB
-
memory/3472-3-0x00000000054C0000-0x0000000005552000-memory.dmpFilesize
584KB
-
memory/3472-4-0x0000000005400000-0x0000000005410000-memory.dmpFilesize
64KB
-
memory/3472-5-0x0000000005450000-0x000000000545A000-memory.dmpFilesize
40KB
-
memory/3472-0-0x0000000000980000-0x0000000000A3A000-memory.dmpFilesize
744KB
-
memory/3472-7-0x0000000006820000-0x0000000006840000-memory.dmpFilesize
128KB
-
memory/3472-8-0x0000000006860000-0x000000000686E000-memory.dmpFilesize
56KB
-
memory/3472-9-0x0000000006870000-0x0000000006882000-memory.dmpFilesize
72KB
-
memory/3472-10-0x0000000006B50000-0x0000000006BC6000-memory.dmpFilesize
472KB
-
memory/3472-2-0x0000000005A70000-0x0000000006014000-memory.dmpFilesize
5.6MB
-
memory/3472-13-0x00000000749F0000-0x00000000751A0000-memory.dmpFilesize
7.7MB
-
memory/3472-1-0x00000000749F0000-0x00000000751A0000-memory.dmpFilesize
7.7MB