Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 22:12
Static task
static1
Behavioral task
behavioral1
Sample
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe
Resource
win10v2004-20220414-en
General
-
Target
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe
-
Size
1.8MB
-
MD5
75c84a17e6650f8ea78a8bbfaa873216
-
SHA1
9f18ebf3a8c23bf9f6ee4042d24123992f2e1fc2
-
SHA256
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f
-
SHA512
489a9b58b9812a90feedbac004631523657d7f4f86b2998fde84c752b4735d4990b55be36603cc3f517a58fab5eed1c51455673d8e6f96b92e7f592dc572eb01
Malware Config
Extracted
sendsafe
UNREGISTERED
31.44.184.123:50005
31.44.184.123:50006
-
service_name
Enterprise Mailing Service
Signatures
-
SendSafe Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1504-56-0x0000000000400000-0x00000000005CB000-memory.dmp sendsafe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exepid process 1504 33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exepid process 1504 33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe"C:\Users\Admin\AppData\Local\Temp\33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage