Analysis
-
max time kernel
90s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
58f0875c2e801df99d7524daf4bc8a41.exe
Resource
win7-20220901-en
General
-
Target
58f0875c2e801df99d7524daf4bc8a41.exe
-
Size
944KB
-
MD5
58f0875c2e801df99d7524daf4bc8a41
-
SHA1
3094c8edaa9bdedc61a7e137b00506759e5d64af
-
SHA256
2e6b14e41b3f871355635c7427cb1531a9b61a37e137f90a590d21eab7648f2f
-
SHA512
bdc93702fb04217709a9416e42e9fdc8d23be7a3e2d66c1ba14bb75e09b5ec662a35cd52da99f6764a4d4798a82f056fd0bb2afcf7b5027dd4b6bca514f21b75
-
SSDEEP
12288:ghLuyAHif1kFXP7mS+dC5RYb4ayQ4iJVftU/x43Cbr3Y3jEbGFv3e:ghLuyyqWAC5+xyn0WxuAY88
Malware Config
Extracted
formbook
dmpz
g6nVYcuLqoVCBunEXBXJ6w3fWQ==
ZcvMXCXftOLl
7llPyUdY6SDW+0jFjBhH6w3fWQ==
oNlI65OL5t6RGejebRdKsAjXGtsK8A==
kU64X5biR3AzyCEnlw==
dHWevaYxywS6e4PXkxhTtP/UGtsK8A==
tucfwSpD6EgygeItq7/COFAbH9E=
tSbx9dJa7CjaS9i1c3d4ImUJ
IlWSNsSPqt6mcQ3d
e0GDBU2jsOzL5OKBIzg=
N83IzuJUqu7g3+KBIzg=
nbC4xt55DmBKL0xV4GLW6w3fWQ==
Tk99naENrAzQj1piGbcl
6043tio61grD5OKBIzg=
HvXh6PMok+vZE1qjJUJClgSk+PAr1skh
JDtEXxkexjYzc+Bwc3Yt
sl+jPuCtSKWIyeKBIzg=
+eXvDCFojnwd9P79cBrQ6w3fWQ==
UfksRCdag5cHMXc=
7OW2uH1YngQA92VbLtpaRLmO/5JOL6k=
Z0k0ODnCBlNh9L25eoBQQKiC2XqFWLQ=
enR3jkAaX7q82uKBIzg=
5KzjT+4Gm+/kXehwc3Yt
zNgNMR9UgGUjaBYLrFLc6w3fWQ==
Hus5X18zWyDy
s6SgsLVB2z9FTJMQvQ25Jnc=
3Gdi5GJ5EWhTtXx1PJhBHA==
rUt8djH/GAPH5eKBIzg=
KUmPxmZh+iPpK3S/R7PtQlAbH9E=
BaKx4Jlqh5cHMXc=
842Jh4jV+CUZ5a2UN894ImUJ
hUnAYPQQX00NWeK/ew+DfMmpCLEfuns0YQ==
PMH2mQIeZ5yesguWhHtDCw==
oqXgJNHYIw7N7hMaFZAEHHE=
aTNm3BdkeVrtQLmFiFMH3xOb5M/P5A==
vjMxtTf3FvWrT07AnCrM6w3fWQ==
a50LuPV2EzzqjmdtKtJ4ImUJ
wekmPyanOGwTwq1wc3Yt
10E2wU8GIhfWRFUqnQ==
ELbHPsqU5Y9kJ2A=
eAcpK+DuxaRPYXZA+SE=
xB0+8GZxym5JgNMyyg25Jnc=
8asRpkxs/WFLWBTc
+zBdZ4ZNteDL+NTC
Xk43JQuI8iUT9uKBIzg=
76Tb9+yL2dCSQEmtW3Jw0z4sNREO
nu9ihjtBknwuR2e1XH94ImUJ
u2ivm9+s+TQ=
96LbB/6TM4mKm8IhPJhBHA==
IUmJnoIQphuaZg==
oESPQbH8DPuQbDPctOfYOVw7stAM+6s=
y+cpSkSGm8iLnuKBIzg=
hqflbsVWpYw/2q1wc3Yt
ixwhmhoryDgqhhelhHtDCw==
D1TH7w6l/q6XUFF/ks3VTac/vIrSuEIp
7nNsADB1kG0wyCEnlw==
RameMNKo82ZZn00CzXKmFA==
wwRCzzZB7FpWvUw7IEkM+kssNREO
F1HOEfmEE21dHg0aFZAEHHE=
S2BlY1v0Py75n2AwmB5F6w3fWQ==
xFndOHgzWyDy
OsP8mvsKn8uNonf1pnQr
ZX2WVrvGYMymcQ3d
H0qJKatulHQ0yCEnlw==
anastasiavekselis.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 228 2672 58f0875c2e801df99d7524daf4bc8a41.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 228 58f0875c2e801df99d7524daf4bc8a41.exe 228 58f0875c2e801df99d7524daf4bc8a41.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2672 wrote to memory of 228 2672 58f0875c2e801df99d7524daf4bc8a41.exe 88 PID 2672 wrote to memory of 228 2672 58f0875c2e801df99d7524daf4bc8a41.exe 88 PID 2672 wrote to memory of 228 2672 58f0875c2e801df99d7524daf4bc8a41.exe 88 PID 2672 wrote to memory of 228 2672 58f0875c2e801df99d7524daf4bc8a41.exe 88 PID 2672 wrote to memory of 228 2672 58f0875c2e801df99d7524daf4bc8a41.exe 88 PID 2672 wrote to memory of 228 2672 58f0875c2e801df99d7524daf4bc8a41.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f0875c2e801df99d7524daf4bc8a41.exe"C:\Users\Admin\AppData\Local\Temp\58f0875c2e801df99d7524daf4bc8a41.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\58f0875c2e801df99d7524daf4bc8a41.exe"C:\Users\Admin\AppData\Local\Temp\58f0875c2e801df99d7524daf4bc8a41.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-