Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
img1910202258454857453739.exe
Resource
win7-20220812-en
General
-
Target
img1910202258454857453739.exe
-
Size
279KB
-
MD5
ea4887c59777688d1eefd6611710224d
-
SHA1
b4fd3fc6792f3d724bc17b235a14b459de0fb85a
-
SHA256
9fd8b0f6c9167d26074c6b95b7cab23af2ac512f4dcdd8486309f489e8953e8f
-
SHA512
081050a2aa2ae52d51ccff4bf7eb289998a5bf660df45e6fdd7c075383ecdd575ae7fc1c31b7beecbef745d4cbf974bb69977da9f0b7f17a38af6046bd356059
-
SSDEEP
6144:81bn6zIMq4u2CorAIVvAGIVoozfRg4KAil0jRdEcc3imi44z4+uemsARMYg:k6zRqerAEvXgLRwIjIy30+jmsAWYg
Malware Config
Extracted
formbook
obc0
A2gNIt4ZLE2WSRNqwwwpsBTT
KLiJs2j/oYJGXw==
GJ5AX02Bzirgole5H/xkbHxxxA==
nhGtQ1jESNk=
M/qrQ6/c8BjOhjUShQwpsBTT
hhjW6ZLD3W5/YSvc/w==
ck6CCdkGHGLCJeYHfoHi2jLrLkMI
M7hs+yxb421IZmQ4g0Y=
P/gftL3tjcgy1JT+Z0g=
v5xRZ1+PJTeGLQRDdVE=
IpZE4CpJa7qSObgbNNO0sAjey1PTVw==
CuMGreIQqVLMeVneRCnVh9LE
5Ig0zy1q8hFYwLGX9w==
wYxI1zZk7juqENdahFM=
8W4jMcvt8hKaBK3UNzfVh9LE
xVQHn+gbtydXi1mU
V9Z5FkCyPN0=
B8RxDECyPN0=
6u4Rp7nkvaoVsRo=
Efs21e4nxg8bux4=
7rJufQ6wDFJCXg==
hDhc6eQNpoUZvj+vEA8Ye3Y+cQVzf5t2
N/4XxkSceCkSQg==
lGIRJRtO8d2CPgfD6j8KAg==
D9r8l777j6Evkhu38g==
flqGC/8nzgTeHeXIMITgU6gGfrpmb/s=
rUQJo8j5jCDt+67V/IY9D3k=
vzrd8Hbm+kiz
6cL4Epe+2PeB32KK8Vgq
DNSEor3tfLItNesmV+SKgtPG
0lQIqesMOG4fiT2N
czBRej53iyAfiT2N
iSjTb9f6USnoIA4=
7px9o179oYJGXw==
0z7YhhNOZKSCL5IBWS7Vh9LE
fTLkdbHlabCGKp/sEXhJHw==
5qbHarHZ7fQ+7oZzq6s92zMpMEIA
/K3X7XCltrveiQc=
75xUZ0RjCFNifGLlVFk=
/pM1U1h4rMGKrHGz16IKAhdMS1IK
WvwROe8uOFVbUBNO4A==
fv6YM6S+1g+FWICJ7g==
ilsSoPsrRlVbUBNO4A==
h/GQNq3R8jEKLOt8r7ki
NbhoB2SUu+KT/X6D6g==
BhyuXc43Q3EfiT2N
/4whty9feY0XiE+U
uUT3h7rfsg3QSz79MJmvR42FzA==
Tfek9ZXF4toJMfpLshny4CzrLkMI
cUr3jgklQ+TOkB9rX7mRhObW43PmXQ==
cxB6yJ/BoYJGXw==
9K/G5KvGoYJGXw==
OAisTc40Ckq0
ggS1zIWdRHvrTPpljFc=
/qREX3OSMpubTM07b04=
fCLT+vMqMHrbhR4nWrvVh9LE
fQa6zU+wSYquIqmxym1AHQ==
4rTiaWSTMErS7vZd1FusGw==
uZ7Nbq3I5AHG9OFfVmk/g9fM
6JJOXAs8UYrloZInmYhazj3rLkMI
5YY+yfAhqvDUkRcqkP/Gn/TZw1bMSg==
DK5Z8Vx7o+KB32KK8Vgq
sDDecsba8xjUDNkJX8WHpLmOzQA=
qE3uifsmMlZaxGEohWE5gZe+zcMDVQ==
dingyujr.com
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2524 set thread context of 4732 2524 img1910202258454857453739.exe 82 PID 4732 set thread context of 968 4732 Regsvcs.exe 36 PID 4732 set thread context of 968 4732 Regsvcs.exe 36 PID 5100 set thread context of 968 5100 systray.exe 36 -
description ioc Process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 systray.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 968 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 4732 Regsvcs.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe 5100 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4732 Regsvcs.exe Token: SeDebugPrivilege 5100 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4732 2524 img1910202258454857453739.exe 82 PID 2524 wrote to memory of 4732 2524 img1910202258454857453739.exe 82 PID 2524 wrote to memory of 4732 2524 img1910202258454857453739.exe 82 PID 2524 wrote to memory of 4732 2524 img1910202258454857453739.exe 82 PID 2524 wrote to memory of 4732 2524 img1910202258454857453739.exe 82 PID 2524 wrote to memory of 4732 2524 img1910202258454857453739.exe 82 PID 4732 wrote to memory of 5100 4732 Regsvcs.exe 84 PID 4732 wrote to memory of 5100 4732 Regsvcs.exe 84 PID 4732 wrote to memory of 5100 4732 Regsvcs.exe 84 PID 5100 wrote to memory of 3152 5100 systray.exe 93 PID 5100 wrote to memory of 3152 5100 systray.exe 93 PID 5100 wrote to memory of 3152 5100 systray.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:968 -
C:\Users\Admin\AppData\Local\Temp\img1910202258454857453739.exe"C:\Users\Admin\AppData\Local\Temp\img1910202258454857453739.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"4⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:3152
-
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1900
-