Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe
Resource
win7-20231129-en
General
-
Target
c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe
-
Size
591KB
-
MD5
3e9ed562d7396b0cf40e2eef56bfb08e
-
SHA1
6438ac88a4e0f722318e80bf5077489c8af64a91
-
SHA256
c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d
-
SHA512
2be71dcf1613979e2bca74401533b80995effc9d90c0d84b1b491f92d3d8f2065f0bb2632165918fd91ff3ec0f58ea74fdf1ecbe99d553f97021b6cec86546c6
-
SSDEEP
12288:vI361h61EWGiSOEMDy83Q2G2h0AQY06NuROqnEcptjOOhnLMIjq0wrVA61:vtY7GiSOEMDy8g2k+06BqVpJfPwrz
Malware Config
Extracted
formbook
4.1
fs35
latechdz.com
sdp-ploce.com
ss203.site
sm6yuy.net
needstothink.com
heginstwp.com
blueplumespirit.com
vemconferirshop.click
yorent-auto.com
eleononaly.com
medicalspacelocators.com
7law.info
imacanberra.online
bbtyss.top
onlyanfans.com
varenty.com
fappies.shop
313865.com
hongpools.com
babkacuisine.xyz
usofty.com
jdjnxsu.com
teammonitoringservices.com
retortprocessinglab.com
rooferstakeoff.com
hansonelecs.com
em4ai.com
urbiznet.com
merchantgeniussaiyanflame.com
elegance-x-agency.com
cheekyfancy.com
ciaraile-hair.store
exactix.online
essentiallymotherearth.com
thebrollybuddy.com
associacaoacademicaguarda.com
manjort.xyz
mylifestylelounge.com
ser25kgr.monster
abbiejhooper.xyz
mjp77.com
dompompomdompom.shop
sugikougei.com
tacosantojrz.com
7yyhdjwwqq.com
vri4d.com
53b9fd8cfbfb.info
xlookcoins.top
uncongneniality.shop
coats-34172.bond
amazingpawpalace.com
actionkillsfear.com
supportlakecentral.com
xn--9kq7ik28o.club
lasermywords.com
t5-1682468.xyz
eastonelitesoftball.com
bagpackgalaxy.com
petlove6.com
fryconnect.online
autolusaccess.com
planetbravos.com
80smaoi.top
iit.world
i-ooedo.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3456-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exedescription pid process target process PID 2772 set thread context of 3456 2772 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exepid process 3456 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe 3456 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exedescription pid process target process PID 2772 wrote to memory of 3456 2772 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe PID 2772 wrote to memory of 3456 2772 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe PID 2772 wrote to memory of 3456 2772 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe PID 2772 wrote to memory of 3456 2772 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe PID 2772 wrote to memory of 3456 2772 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe PID 2772 wrote to memory of 3456 2772 c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe"C:\Users\Admin\AppData\Local\Temp\c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe"C:\Users\Admin\AppData\Local\Temp\c0126f29188353d5cc569ac4c7430b15aecebf14a60dd9dcac498fd3dc299e0d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-