Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 07:28
Static task
static1
Behavioral task
behavioral1
Sample
38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exe
Resource
win10v2004-en-20220112
General
-
Target
38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exe
-
Size
1.8MB
-
MD5
954e5bfc83812346d1cd11a59f7d205d
-
SHA1
179dd32769c491758ff2e418c9b20efc94af5725
-
SHA256
38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d
-
SHA512
1d9eb7e3548e9082cccff9823ef7c205d9f161e35b66be22cc9737cfbf013781e56647fb54941945614310ba91f44904fe3341d03cb39779bbc41a1951503feb
Malware Config
Extracted
sendsafe
UNREGISTERED
31.44.184.32:50035
31.44.184.32:50036
-
service_name
Enterprise Mailing Service
Signatures
-
SendSafe Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1964-57-0x0000000000400000-0x00000000005CA000-memory.dmp sendsafe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exepid process 1964 38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exepid process 1964 38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exe"C:\Users\Admin\AppData\Local\Temp\38d3f45c15d354a76eaa73d2da717165dee22b8207fa87088685486019ff482d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage