Analysis
-
max time kernel
45s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 11:36
Static task
static1
Behavioral task
behavioral1
Sample
38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe
Resource
win7-20220812-en
General
-
Target
38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe
-
Size
917KB
-
MD5
f25e3594aba0fdc9c3d98043bedd16c6
-
SHA1
bcf633e24eff060782aaf7dd6e5a1fc61796d586
-
SHA256
38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee
-
SHA512
da43b1977800eee7cfb046d536fc1e7b804791dace90996be5e41f29c66b31d14e37e3a98626357a8706a234ba378617a49facae75c811405a1b44a5cd56d6d2
-
SSDEEP
12288:kYRcrWWvUZ4tlgD9yvR+ZBKm6M4qHKuw3BMUhpU1xo5Mik4EhBHglt:kY2vUZ4tlA9URmkm6dqqV3ecpUL
Malware Config
Extracted
formbook
vez2
GCFh2WRY8h1RjEXapwS7Ck9LsYM=
Kw/ixUjrf6eR4l/24Q==
UU+jUhRwjrFC148Z
QbmEkwuT9vV0auS9f1g=
X/Bx/B8ftQ==
VkMUQmSy0OalCood8g==
BNLY7KKp9TVIQOS9f1g=
4T0IQw/gaKqntY81D2bTIzrbjw==
hVWRNvRVcKktVh2ymZKRgeSyJ0RoIbo=
Fef69GXN5DS86bNZQiZFu/q98os=
28+h068jMHplsKGaJQxI
5kXPNMQEFGjp6MuaJQxI
3U8XDYYOlJwvdF0f4w==
XVqaJqutwWlhek3SahJ4hg==
8g9h2U1zhLBC148Z
Q8NMHfa/7y+yrZpDEgLiBZBvwVt9Vvm5
jXeQnSyl0RXqI/ulQvZ9jA==
3cHSwlLqCBnkOQy9jXZ7AiKZ
6PU7tS0owgIcNy/fahJ4hg==
WVMuelelvwPA9XaFQtUSN8o=
oxOgZY5X+kpJRzbfahJ4hg==
r7L6bNz0EKKWm1r9yTvSIzrbjw==
nvZK/dzn+K21trt9YgEqStQ=
Qh9x72hr9/3V5tuse3p7AiKZ
W7t6dwR2ouuxAs6aJQxI
+0e3Qjyjyy5P
7kzGg1rJ7aCIeW4=
JAsjE6RsEVKxD/aFUwEqStQ=
Je3t21z4h7OZraBF9A9S
HW/0V7rwVndmf2kQ4w==
4+U3w2aii4malw==
ONFfFciRMr80T+S9f1g=
i+x562lrSxlOqHkS4w==
SMmGa9higroEc+rNahJ4hg==
mAvKtSi04fVDU+S9f1g=
Sw9CuTJIXpcDFNdqRiAACnBKtX++sp4zyg==
LBktfGTY/IWb8Oa8nfFpjiTh2pfaiQ==
yD8A94L5AD7BvWJTM4tA
KQkIApAevHcMJQqjc1Z/2R2kp93dsRS7
hGuhIby/XpDLHfVzPy00NE9LsYM=
xDO5Ho6TMnGHyl8T6w==
NWvYhTQJ472fnQ==
LDRINrI/1HHk25UxDerd7CaGglfHgw==
UIw6kpvf8UNJyl8T6w==
XlOFTTxF2efJ9N2bW0suWOek4FdZVfmx
gJ6prS6w0dk4PtieiU8=
pBupaBj6obqVyl8T6w==
hVvGQT1E472fnQ==
dP+y65v1ESz3VEUG/mLvcILlgw==
7aWd1pbk7gpla+S9f1g=
1iWugD8RpcgUVeS9f1g=
M5knlSQy0ucNQy7dxb+8uwqxKnnq
W1SXSgqIaKFZ
0zLOflijwltC148Z
DeCu9NRgMm1B
y0U+QN6lNWFJYSfOciOmnw==
VT8YPOxRdFRnq4wtEnYmU8o=
X1BSjmDne+Cbq3k=
W+m8tR6vP3lneDvMahJ4hg==
JiM1H6x6GGuHyl8T6w==
4TX8JuyoL1xAQRbJahJ4hg==
6sO+AdD7472fnQ==
WdVSAqtr++dnyZIuIQC/JsGn84o=
8FWkZSXtjr33LvvFahJ4hg==
webuildamerica.org
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1648 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28 PID 1752 wrote to memory of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28 PID 1752 wrote to memory of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28 PID 1752 wrote to memory of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28 PID 1752 wrote to memory of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28 PID 1752 wrote to memory of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28 PID 1752 wrote to memory of 1648 1752 38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe"C:\Users\Admin\AppData\Local\Temp\38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe"C:\Users\Admin\AppData\Local\Temp\38611cbec59d31636dfa80e39146bc9c96d3515fbafd9ea16f7392bdfeee69ee.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-