Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe
Resource
win7-20240508-en
General
-
Target
8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe
-
Size
697KB
-
MD5
3e04e26d5c74db5d85cda99b11aac28b
-
SHA1
c7de7504f9930b79f343c3a4dd89ca78ed9dc59e
-
SHA256
8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f
-
SHA512
737efcc73dc774c60b00034ffd4e7afa6263e7db9f62f3119868c97eb90fd7869d370020bbefb230b2aca40d85c7724ca28ec99f3348b446e5d1c5539fa5b375
-
SSDEEP
12288:Kuo6JNf+wnzTiPmj68y0+6bUGUm5OiwM6kLY2oa0WwgOPfz5OVVBHGDS6:jJ9TDj68yj6bYRwtY2oa0YOnlOtm1
Malware Config
Extracted
formbook
4.1
dy13
manga-house.com
kjsdhklssk51.xyz
b0ba138.xyz
bt365033.com
ccbsinc.net
mrwine.xyz
nrxkrd527o.xyz
hoshi.social
1912ai.com
serco2020.com
byfchfyr.xyz
imuschestvostorgov.online
austinheafey.com
mrdfa.club
883106.photos
profitablefxmarkets.com
taini00.net
brye.top
ginsm.com
sportglid.com
hdretailllc.com
umeshraja.com
bum-arch.com
carefulapp.com
kjqlq.top
3dsciagames.com
520yhy.com
magahatinu.com
freedompopo.com
directgaragedoor.com
tyupok.xyz
thecrystore.com
camperelektrikde.shop
soloparentconnect.com
sonderfullcoaching.com
jesuscrewofficial.com
oioc.xyz
assineunitv.com
whysco.com
484844.vip
gdctus840t.top
acc-pay.top
bdsmnutzbar.info
sdplat.media
cioncarp4213.com
facecasino2.top
bankablebark.com
gulerweb.online
radheyranidailyproduct.com
fin4d-sl.com
northshorehousekeeping.com
femmeteefatale.com
d0ge6or54x07cfn.xyz
craftwhirl.com
kgfna.biz
real-estate-96841.bond
cfuhtkwo.xyz
nestormediaproduction.com
txglobedev.com
kermoal.dev
yr8gl32.vip
bathroomremodelnearyou.today
nearmeacupuncture.com
chicstop.store
cpuk-finance.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3316-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exedescription pid process target process PID 3128 set thread context of 3316 3128 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exepid process 3316 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 3316 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exedescription pid process target process PID 3128 wrote to memory of 3316 3128 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe PID 3128 wrote to memory of 3316 3128 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe PID 3128 wrote to memory of 3316 3128 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe PID 3128 wrote to memory of 3316 3128 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe PID 3128 wrote to memory of 3316 3128 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe PID 3128 wrote to memory of 3316 3128 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe 8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe"C:\Users\Admin\AppData\Local\Temp\8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe"C:\Users\Admin\AppData\Local\Temp\8209a6f8283a09d52c15681a35047db39b499d081f8c843119252b4c72961c4f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3128-6-0x00000000064A0000-0x00000000064BA000-memory.dmpFilesize
104KB
-
memory/3128-0-0x0000000074A6E000-0x0000000074A6F000-memory.dmpFilesize
4KB
-
memory/3128-2-0x00000000051F0000-0x0000000005794000-memory.dmpFilesize
5.6MB
-
memory/3128-3-0x0000000004C40000-0x0000000004CD2000-memory.dmpFilesize
584KB
-
memory/3128-5-0x0000000074A60000-0x0000000075210000-memory.dmpFilesize
7.7MB
-
memory/3128-4-0x0000000004C00000-0x0000000004C0A000-memory.dmpFilesize
40KB
-
memory/3128-1-0x0000000000160000-0x0000000000214000-memory.dmpFilesize
720KB
-
memory/3128-7-0x0000000006500000-0x0000000006508000-memory.dmpFilesize
32KB
-
memory/3128-10-0x0000000010950000-0x00000000109EC000-memory.dmpFilesize
624KB
-
memory/3128-9-0x000000000D130000-0x000000000D1A6000-memory.dmpFilesize
472KB
-
memory/3128-8-0x0000000006510000-0x000000000651C000-memory.dmpFilesize
48KB
-
memory/3128-13-0x0000000074A60000-0x0000000075210000-memory.dmpFilesize
7.7MB
-
memory/3316-11-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3316-14-0x0000000001110000-0x000000000145A000-memory.dmpFilesize
3.3MB