Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 15:56
Static task
static1
Behavioral task
behavioral1
Sample
1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe
Resource
win7-20220812-en
General
-
Target
1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe
-
Size
236KB
-
MD5
359fcad9ab0d8c7e8b7a37a71ad3ca62
-
SHA1
ce1a50828ef2bf7ac4e4a8087be562608d6ea333
-
SHA256
1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857
-
SHA512
eb1cf064da1c8c79d7df9f54e07f7cbfbbc8b2ade7a1e7a6cdf876a1f37d68950a168a93de057a2be89c5797ace88335521eb9301d930d274e168b56ec48ab17
-
SSDEEP
6144:QhfSqW96QlU0yyw1GvwrH+vhSTLlG3S+GSh:txKGorevKG3LGS
Malware Config
Extracted
formbook
s6n0
Rjdlh6/zHSTR8l/qBc5Sli4N
bhgURHTfHUEmULTxQLSp
3Mn6FAv7Rt3FIPw5+kA=
zzm54WQwP1JMitEUPCXw2Mtf7nw=
lH+0SLi17B0EImL9kIHJZTzN0g==
w4e94tKevUJDrXDKWQ==
jX0l3sCks02uxLWsBEY=
0HzjTYsaHz32
9uPhvBK58Xw=
AHhhDXWv7IXlXM1M
iudYICANV+wWQVi7yvUscCc=
nhEVQEw1bBqdx1aARrFLZjA=
hOLnEhr977jtBeQlD5GrJG0F
WztsD4N8tOilL+oaXA==
XjhvrbHxpFuwL+oaXA==
o30u6uO9C7rY+fVt5dFbflBuv2M=
oo3Lbi1e215kpdUB/HDcZTzN0g==
uZHWfdvQBDpCVl7qhnlDZTzN0g==
LJmOPvgvTFz7XrDXlBtSli4N
VxULunnWfwDG92nqBMgaXE8r63Y=
LiNGCnlnmZFFjCtpHPdf2WzQ2A==
ZlGDsudP+KbuIQsuZ2ZPR08r63Y=
RCRZhI1wjA5FUg6HGP3vAPESlqer
YQsNpCV2U1D8
RiPcEsTXCEFUldIaXWFBZTzN0g==
elujQPQyWFQZVgFKXcWr
TynzDq4TzO2SptkE0nnRZTzN0g==
27b7jlDLFld2jop5EEWg
6pHDcjua3fmx97pR
rQ37ui1vIk4ZUq7oIlT1PHga2oiMzQ==
SzfyqqWQt0vSCp/xQLSp
i/hpKiH/QQWAiO9umCBSli4N
zycgSJ3D8pzA6jirpg31XuIGlpqh
zKxyGEJvQBKLlOVO
rIPQcjChUgRYmazvREoVAcOruXnlLaY=
unWZeZ7EDOYEFg==
jXm02MLnDwCB+E2zplWh
3Md7LE3GO/zwANpCwMZncLvbmTx7zQ==
TxJT81R2U1D8
sBQPt2zLfCxdmMbxQLSp
/WPYjtUVIGUeYhg=
NZKDSBBvGLzaL+oaXA==
M++h2ovzhY88T3sIW47RIg==
kUOvWZH9baFp79YXVg==
DfGlWK0Oq7BgesDxQLSp
Ug95KQk/y2aGtd4H0n7JVOcGlpqh
JRFG6VcqNTsudsLxQLSp
ogCLszBnCRmp2IPQrDJSli4N
NuOkVKIHptR4ifmCqBTiVJcBu54PxQ==
PPOnSDcWH2UeYhg=
KeDd9/fjGoJ+79YXVg==
+6cVy8VdBAARSrPxQLSp
ovZtoDEfZYwxQ7MmRbFLZjA=
uGcJsbSTtGrR3Grfn3l2pWQa
wbFnoE69dID4EazooCBSli4N
uq3eFhj9H2UeYhg=
Ta2iXB9Gd446WLXxQLSp
bcXG8gHYCa3WL+oaXA==
bVP/21nuDOYEFg==
LwPCb7s3fiWSqVqHQrFLZjA=
uhYZNy9J4Zp8myape/UscCc=
4dMMuzYncoE1dQI8qLFLZjA=
hEJ56qeR5RXdGIP0H6rjRs+vuXnlLaY=
d1qRO/UkPlBNiMLxQLSp
onlinecoffeeshop-fr.site
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1380 set thread context of 2612 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 81 PID 2612 set thread context of 2648 2612 cvtres.exe 30 PID 2072 set thread context of 2648 2072 control.exe 30 -
description ioc Process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 2612 cvtres.exe 2612 cvtres.exe 2612 cvtres.exe 2612 cvtres.exe 2612 cvtres.exe 2612 cvtres.exe 2612 cvtres.exe 2612 cvtres.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2612 cvtres.exe 2612 cvtres.exe 2612 cvtres.exe 2072 control.exe 2072 control.exe 2072 control.exe 2072 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe Token: SeDebugPrivilege 2612 cvtres.exe Token: SeDebugPrivilege 2072 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2544 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 80 PID 1380 wrote to memory of 2544 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 80 PID 1380 wrote to memory of 2544 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 80 PID 1380 wrote to memory of 2612 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 81 PID 1380 wrote to memory of 2612 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 81 PID 1380 wrote to memory of 2612 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 81 PID 1380 wrote to memory of 2612 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 81 PID 1380 wrote to memory of 2612 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 81 PID 1380 wrote to memory of 2612 1380 1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe 81 PID 2648 wrote to memory of 2072 2648 Explorer.EXE 82 PID 2648 wrote to memory of 2072 2648 Explorer.EXE 82 PID 2648 wrote to memory of 2072 2648 Explorer.EXE 82 PID 2072 wrote to memory of 2320 2072 control.exe 91 PID 2072 wrote to memory of 2320 2072 control.exe 91 PID 2072 wrote to memory of 2320 2072 control.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe"C:\Users\Admin\AppData\Local\Temp\1e2499187de0cc218823f81fe3d62a284a9220d62401a1510489682de9b32857.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2320
-
-