Analysis
-
max time kernel
90s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2022, 07:17
Static task
static1
General
-
Target
3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe
-
Size
920KB
-
MD5
f33602a685ab4c942327e514c4e6797c
-
SHA1
9fe4e86b3689240a730738393a04b5f72db423af
-
SHA256
3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b
-
SHA512
7d07330ff231a8d6c7ac94ffb50ba5a345c09498f382b76dc541d28b8b184b5c1fe2be15e2fa57b4f9e626c297ad50b8d971a91af5c23bdb9d3079f7f237d048
-
SSDEEP
24576:1OXIynvFDqx+Scy66+93DoBnH6oXXS4ve:CvhqQSY6kDci4
Malware Config
Extracted
formbook
dmpz
g6nVYcuLqoVCBunEXBXJ6w3fWQ==
ZcvMXCXftOLl
7llPyUdY6SDW+0jFjBhH6w3fWQ==
oNlI65OL5t6RGejebRdKsAjXGtsK8A==
kU64X5biR3AzyCEnlw==
dHWevaYxywS6e4PXkxhTtP/UGtsK8A==
tucfwSpD6EgygeItq7/COFAbH9E=
tSbx9dJa7CjaS9i1c3d4ImUJ
IlWSNsSPqt6mcQ3d
e0GDBU2jsOzL5OKBIzg=
N83IzuJUqu7g3+KBIzg=
nbC4xt55DmBKL0xV4GLW6w3fWQ==
Tk99naENrAzQj1piGbcl
6043tio61grD5OKBIzg=
HvXh6PMok+vZE1qjJUJClgSk+PAr1skh
JDtEXxkexjYzc+Bwc3Yt
sl+jPuCtSKWIyeKBIzg=
+eXvDCFojnwd9P79cBrQ6w3fWQ==
UfksRCdag5cHMXc=
7OW2uH1YngQA92VbLtpaRLmO/5JOL6k=
Z0k0ODnCBlNh9L25eoBQQKiC2XqFWLQ=
enR3jkAaX7q82uKBIzg=
5KzjT+4Gm+/kXehwc3Yt
zNgNMR9UgGUjaBYLrFLc6w3fWQ==
Hus5X18zWyDy
s6SgsLVB2z9FTJMQvQ25Jnc=
3Gdi5GJ5EWhTtXx1PJhBHA==
rUt8djH/GAPH5eKBIzg=
KUmPxmZh+iPpK3S/R7PtQlAbH9E=
BaKx4Jlqh5cHMXc=
842Jh4jV+CUZ5a2UN894ImUJ
hUnAYPQQX00NWeK/ew+DfMmpCLEfuns0YQ==
PMH2mQIeZ5yesguWhHtDCw==
oqXgJNHYIw7N7hMaFZAEHHE=
aTNm3BdkeVrtQLmFiFMH3xOb5M/P5A==
vjMxtTf3FvWrT07AnCrM6w3fWQ==
a50LuPV2EzzqjmdtKtJ4ImUJ
wekmPyanOGwTwq1wc3Yt
10E2wU8GIhfWRFUqnQ==
ELbHPsqU5Y9kJ2A=
eAcpK+DuxaRPYXZA+SE=
xB0+8GZxym5JgNMyyg25Jnc=
8asRpkxs/WFLWBTc
+zBdZ4ZNteDL+NTC
Xk43JQuI8iUT9uKBIzg=
76Tb9+yL2dCSQEmtW3Jw0z4sNREO
nu9ihjtBknwuR2e1XH94ImUJ
u2ivm9+s+TQ=
96LbB/6TM4mKm8IhPJhBHA==
IUmJnoIQphuaZg==
oESPQbH8DPuQbDPctOfYOVw7stAM+6s=
y+cpSkSGm8iLnuKBIzg=
hqflbsVWpYw/2q1wc3Yt
ixwhmhoryDgqhhelhHtDCw==
D1TH7w6l/q6XUFF/ks3VTac/vIrSuEIp
7nNsADB1kG0wyCEnlw==
RameMNKo82ZZn00CzXKmFA==
wwRCzzZB7FpWvUw7IEkM+kssNREO
F1HOEfmEE21dHg0aFZAEHHE=
S2BlY1v0Py75n2AwmB5F6w3fWQ==
xFndOHgzWyDy
OsP8mvsKn8uNonf1pnQr
ZX2WVrvGYMymcQ3d
H0qJKatulHQ0yCEnlw==
anastasiavekselis.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3488 set thread context of 3028 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 93 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 3028 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 3028 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3488 wrote to memory of 3040 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 90 PID 3488 wrote to memory of 3040 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 90 PID 3488 wrote to memory of 3040 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 90 PID 3488 wrote to memory of 1000 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 91 PID 3488 wrote to memory of 1000 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 91 PID 3488 wrote to memory of 1000 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 91 PID 3488 wrote to memory of 2172 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 92 PID 3488 wrote to memory of 2172 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 92 PID 3488 wrote to memory of 2172 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 92 PID 3488 wrote to memory of 3028 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 93 PID 3488 wrote to memory of 3028 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 93 PID 3488 wrote to memory of 3028 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 93 PID 3488 wrote to memory of 3028 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 93 PID 3488 wrote to memory of 3028 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 93 PID 3488 wrote to memory of 3028 3488 3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"2⤵PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"2⤵PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"2⤵PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"C:\Users\Admin\AppData\Local\Temp\3ec647b954f76b4a8a4817083e7191ad18a4a541a5f7875682b3009fb9f9649b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-