Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 19:51
Static task
static1
Behavioral task
behavioral1
Sample
1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f.exe
Resource
win10v2004-20220414-en
General
-
Target
1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f.exe
-
Size
1.9MB
-
MD5
9a566b4c059f8a656edbce5848794074
-
SHA1
d62aac9fbcd40b39a6a64147dd63b314c15c1f18
-
SHA256
1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f
-
SHA512
72dcc2e510296f3ef8b3a72be10a4491a4a20024b71556b7ee1c8c3ae334c6ab405b67a105e9ad9ca8065470173f850d4cc8b15b6847217878ac8d2c38c5a918
Malware Config
Extracted
sendsafe
UNREGISTERED
31.44.184.140:50013
31.44.184.140:50014
-
service_name
Enterprise Mailing Service
Signatures
-
SendSafe Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5004-131-0x0000000000400000-0x00000000005E4000-memory.dmp sendsafe behavioral2/memory/5004-133-0x0000000000400000-0x00000000005E4000-memory.dmp sendsafe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f.exepid process 5004 1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f.exe 5004 1ed38d34149e4dab34c0fae63b684b8d307ed49323593258e6b12a12cdc7657f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5004-130-0x0000000002370000-0x0000000002522000-memory.dmpFilesize
1.7MB
-
memory/5004-131-0x0000000000400000-0x00000000005E4000-memory.dmpFilesize
1.9MB
-
memory/5004-132-0x0000000002370000-0x0000000002522000-memory.dmpFilesize
1.7MB
-
memory/5004-133-0x0000000000400000-0x00000000005E4000-memory.dmpFilesize
1.9MB