Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 11:17
Static task
static1
Behavioral task
behavioral1
Sample
f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe
Resource
win7-20220901-en
General
-
Target
f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe
-
Size
822KB
-
MD5
3584af4c7ff3061dc605bfc0de9d478d
-
SHA1
c503adf44637ac957da9cae59dd096253ab4b195
-
SHA256
f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482
-
SHA512
2efa424e30bb3dd04149b214da74073403b5214c96259d0155819b1897bc3006ee3b1e58cbf1564e4a555e72f0cbf9aa3b54317cdcbd81079af18a434480eb14
-
SSDEEP
12288:LSC+LolWHgwDh75VhQKLpSiro7BvE1lhBLW+EcULD:yLolWAwDh75Yidro7hE7h2
Malware Config
Extracted
formbook
cqd8
9zPItsSBQPthH0B1
iyz2ugC7TUMEaZEDDTNIzw==
uVc25zCFO03zbYzHxXLElk5HHccFoes=
RYDZw1su7yszucXjwqtgrz1tSccFoes=
AiB+KfBdDLRFs8sOAsmAllKZeg==
w5T7/Y1lNGBeMdKkKNl8tUl3fTWjlURG
mcIHqPCaEavSyg==
YA7dyN6xKf1MKJa/RA==
Dt789IRVd/fO8FeQNOiV3g==
jYfu3dS4b/1OL59exnPPEo4=
SjyOSKD6lRhpWwUmMwE8ncB1KOg=
JIT782/TaO41DXw3hYJa1g==
uT4u7SwA+3yA/iCo0O7tHyeffA==
/gJzPfngDySzwndmyHPPEo4=
+Um8wD7b9bCQ8A9cK4Nl1oA=
RaikVqx5ozxW3vd6khgIHsDMgKrv
hyYEyRMIEJ8WdnFePeLgHyeffA==
bCov6raFJ30odm5fJQQ=
1rMMrXrTf7OZqyLVM708wZ0=
U4nspOC6sJ3et2I=
Amsy4i4MxPTrXYWeojyK
qqYLwgp2O/CAx73ntWL3DLmD
v+o9+ruZZv5gEuvofQ4=
Q2TEpDYKHJSOCCGbqS91tm+gZCM193JQ
myoIxQ/iiohHn17RlzWI
rzQd05nrgI907Re4QPfYHyeffA==
QkC8sCmTTfZrZLz5hAw=
t5r3o/G/cZ+vdu+g+oMEE8B1KOg=
C0u8wFktz793xKe4jnATIMyJ
TjKaV5ZbDyQHOJcUcFCC
djpCCcmZXwlBpMPyIUZf3A==
Un779oxhdgtHI8SnDdcOIJc=
YKgTvQjejYw4pbqeojyK
KBd0a2BKX1jU15Ctom33DLmD
aZ7/sQblqNS+Nla7AauEB8sNyUDm9Cki3A==
zJhnWWws5JL973c6hYJa1g==
gb0n1xj1K9MC+ad0z3Q9RRUT7+A=
0sQMsgbWCJyyZFPrSA==
20IjpORM6MDYxQ==
N2y7vVIlDbMG+AQ9Xw==
agEIEhBjAg3OQ16NYNzfakfMbRKp7w==
wDsU0Rr/6MDYxQ==
NTeghQ12G3s0MZTduZkswZ8=
L97Zk19BYXUZfWlr/Hbj7Vt5T8cFoes=
YHzblVUr2IQblbeeojyK
NWrc623LYOxVqMvtvtcOIJc=
Dop0ZWnNM31cvnASfhs=
cKw08CYD6MDYxQ==
lz8u3baYpK4zHYw3hw6iJc3MgKrv
0Z9yXF01VUO1A/rtvHT3DLmD
7IxuWmMwLzEGXXr7TPzbHyeffA==
S+IyyYGNQ+w=
OWLEsDwEJcYYEcOg8Jv2NZ0=
hpoR35NpipozlYN/D8SS7rT7bRKp7w==
mZgB83regxFgYgTmbOhb3LW2m5Sa02tO
P4jc4mGzUuhRSebNpG73DLmD
rjMAwp8+nZxq
t9Ab0ZFjaHgssun2RiGA
CEKgRx1lGCe1DvvzfjFHWAGQNu4=
295oZvzAc4xt4wVshYJa1g==
+f5vXOqxxTQWorueojyK
CMKeTBzmgQ+IlQgskhU=
2lhYTVMvVGIRj7GeojyK
BCq+UU4+nZxq
tornoallavita.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exedescription pid process target process PID 2032 set thread context of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exepid process 1352 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exedescription pid process target process PID 2032 wrote to memory of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe PID 2032 wrote to memory of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe PID 2032 wrote to memory of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe PID 2032 wrote to memory of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe PID 2032 wrote to memory of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe PID 2032 wrote to memory of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe PID 2032 wrote to memory of 1352 2032 f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe"C:\Users\Admin\AppData\Local\Temp\f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe"C:\Users\Admin\AppData\Local\Temp\f76f5834e3f530f51170304bbfd84fbbafc93a063dd418c6c8d87e4c6669f482.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1352-64-0x00000000004012B0-mapping.dmp
-
memory/1352-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1352-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1352-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1352-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1352-67-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1352-68-0x0000000000990000-0x0000000000C93000-memory.dmpFilesize
3.0MB
-
memory/2032-55-0x00000000766D1000-0x00000000766D3000-memory.dmpFilesize
8KB
-
memory/2032-56-0x0000000000620000-0x0000000000634000-memory.dmpFilesize
80KB
-
memory/2032-57-0x0000000000640000-0x000000000064C000-memory.dmpFilesize
48KB
-
memory/2032-58-0x0000000007F50000-0x0000000007FE0000-memory.dmpFilesize
576KB
-
memory/2032-59-0x0000000004130000-0x0000000004164000-memory.dmpFilesize
208KB
-
memory/2032-54-0x0000000000080000-0x0000000000154000-memory.dmpFilesize
848KB