Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe
Resource
win7-20240221-en
General
-
Target
6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe
-
Size
658KB
-
MD5
76f39576733999c9850c86acdd8f73d5
-
SHA1
1106ff36fe0aa76ec385621c78c67d1e022f0ab1
-
SHA256
6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a
-
SHA512
d9db9fe8fba9e5c5bccc73af0a146ff680bbf72f962e1fd1597eca4daedce03ea4ec109fdbbf7accc8b3377bf4886a3108e6bfd0464f0d2e6a458402cf1d1c7d
-
SSDEEP
12288:AX0px+V36Di8BtL5KuuPuTLkvt3jekIIaeUx2/xfGcJj:SBFKfyPuTiJj+IaeQPc1
Malware Config
Extracted
formbook
4.1
cr12
nff1291.com
satyainfra.com
hechiceradeamores.com
jfgminimalist.com
qut68q.com
pedandmore.com
sugardefender24-usa.us
somalse.com
lotusluxecandle.com
certificadobassetpro.com
veryaroma.com
thehistoryofindia.in
33155.cc
terastudy.net
84031.vip
heilsambegegnen.com
horizon-rg.info
junongpei.website
winstons.club
henslotalt.us
home-care-72875.bond
elmetaversal.com
thetrendingproduct.com
kiki-hello-jury.com
fertami.info
free-cell-phones-en-arena.sbs
emilogiska.com
airexam.in
masters-of-1.com
othersidings.com
fullpaw.com
xmmtrader.com
astronomersparadise.net
cert.agency
pools-97641.bond
forexsignals-trading.com
bxsmediaconsulting.com
perfectedskincare.com
footresort.com
warehouse-inventory-80963.bond
purifygenius.com
bolinkpass.club
velleclub.com
epuar.com
winningpickleballshots.com
spiaggia.club
kadinzuri.com
keyboards-280323.cfd
africanfemalefounders.club
tkoelectriical.com
wg5688.com
properrr.com
fortune-tiger-rede.com
65302.vip
psychologyzerodegrees.today
top99bet4d.site
priuswuxi.com
carneden.com
ptwix.xyz
furniture-70925.bond
064817.com
ferradaoffroad.com
pix2click.life
jurj.xyz
spiritualpath.info
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2688-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2688 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28 PID 2044 wrote to memory of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28 PID 2044 wrote to memory of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28 PID 2044 wrote to memory of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28 PID 2044 wrote to memory of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28 PID 2044 wrote to memory of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28 PID 2044 wrote to memory of 2688 2044 6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe"C:\Users\Admin\AppData\Local\Temp\6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe"C:\Users\Admin\AppData\Local\Temp\6155148c4e00c86359fd0cd7de903ed5631e68e2d6148cfcc88c914e4ed69a0a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-