Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-11-2022 15:59
Static task
static1
General
-
Target
87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe
-
Size
448KB
-
MD5
0157a88e62b7651bf765bd4fbf73264c
-
SHA1
fba492f92871cbf674563578d3e91ccb4a412c71
-
SHA256
87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60
-
SHA512
821184beaa4e49af6e05583992ea98800a1494fcfe4c0d534dbb048dc2960208545432bb1c59c7f5cb69573bb2e7cb33d90904415c6563873ead802c4e4279c7
-
SSDEEP
12288:w1bVCfn7om/rE7KdHJaKZODGZ5N1Um4ObM1Mjc:w1ofn7X/9dJaSODGZ5f5hoajc
Malware Config
Extracted
formbook
dwdp
4DlAaMhdJtwJ15R2TZiMx6GwCg==
oilWdXwEy3OHItOqfLCNx6GwCg==
Ak8/PHhAG8EabtQ6
6M2Ej6pHE8pIcmJHMnpaZmZN50HzwA==
TbfoWsWBhyisR1OC/WI=
c9L5DAKvlT90Emj/mejR
Q52SsCG4oEvuFmMtB3U=
OpXGZzbo03aPI4RLsRqSjCi+4btteRj9
HXOuQvq3ok8Cm/9OCg==
NR7FUuGQbFKbPFOC/WI=
vCVkAKp/MCYvTA==
EIB9dcNoJczrDx1+2FMCpUWh
AelRyJUy6pU3TPPyep9VeiM=
pxM6rxHct23r9lOC/WI=
Jo+EpynW0bkd8EQ=
c93g9H4q6pCGbWGE6jGTmys=
KxeWJh3IeirmwBLvQ6xa5He4
Y18bQIZHI87qwl3/mejR
UDOSCrReNObV5g8I/0swTl5K50HzwA==
6Wum4j786IYvBgz/fu7G
WE4ZPZA9Damd/ts0fJ9VeiM=
/t2IjaZVOgAz25JBBTgmlCaWfOZZVDg=
Z98NDw7Qo1vfdVj3A2Q=
pZRR+bBDAaVJ4noF6zksdaO5U5m67UpCyg==
0ElEhBa+nFA+UEn+Dh4VEA==
gXf7eDj108gj7e6xi+pc513iqaU=
cFz/pD7muXS6lJVRHw==
aVnbem8uEbxIXP36xgHfBw==
HQlrGyPOok11FLtmNZqJx6GwCg==
MwzH3feUSej9l2dIKJSYrrS1U5m67UpCyg==
AHbMSjNP55iz
GAZORVxP55iz
Oq6vwAWaeB7UZ6hYHQ==
zEAtZ+ytoj3ZZ6hYHQ==
rAfyBEXLhyYxTl/OTrAfx6GwCg==
18d4nNJ9VvopA8h3SZ5a5He4
dKj37qc0F70abtQ6
dtXiZCe8g0DVa2GE6jGTmys=
1TwrUcyJMCYvTA==
Oh97GfzNmz3debrl/11Dpis=
ZUurN/7Fckzrsea8Imo=
g9X+HmcU2YGqxt//fu7G
qKJdXlnnr0xHoa6Nd9TZ
pX/hd2YsDqXNltuKf+PZ
8G+oOteOhii73yvEpPHT
Xk7IPuiKWvyv017/mejR
3MY2uHs8B6ItvKATmPlReimt/SlO
qY0Dx+PQbCpd+lv/mejR
QCuKCsNMCb5HEBD/fu7G
4j12D6t/MCYvTA==
AKG9wcOPD625
7U5TV7BjXwS/kX7vYa4PSTSEiK0=
nwnn/2sqCaiduNA1f59VeiM=
LpDOWAmifStd9lv/mejR
QqGXpOmWRfqKrD6id9Gr88S+Ew==
r4r7hEIC9apiOlOC/WI=
Ny/s8P+4fSqjMgJh90okGjJG50HzwA==
Yb/udvywew6tVKJ5wxvtGEJK50HzwA==
EQPGycyRejDarZfwTKIbx6GwCg==
spgJj2oQybkxTeG8HGo=
TrP2c/a2dxg/BGb/mejR
pYc8Unok/KakiKmSZXTOjDSEiK0=
f1/MZDffs2YQ4NQ0f59VeiM=
T0eBXUr+2JaMIVs=
onlinehealthclubs-d.site
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exeCasPol.exeipconfig.exedescription pid process target process PID 2124 set thread context of 2556 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe CasPol.exe PID 2556 set thread context of 3064 2556 CasPol.exe Explorer.EXE PID 1688 set thread context of 3064 1688 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1688 ipconfig.exe -
Processes:
ipconfig.exedescription ioc process Key created \Registry\User\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exeCasPol.exeipconfig.exepid process 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe 2556 CasPol.exe 2556 CasPol.exe 2556 CasPol.exe 2556 CasPol.exe 2556 CasPol.exe 2556 CasPol.exe 2556 CasPol.exe 2556 CasPol.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3064 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
CasPol.exeipconfig.exepid process 2556 CasPol.exe 2556 CasPol.exe 2556 CasPol.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe 1688 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exeCasPol.exeipconfig.exedescription pid process Token: SeDebugPrivilege 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe Token: SeDebugPrivilege 2556 CasPol.exe Token: SeDebugPrivilege 1688 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exeExplorer.EXEipconfig.exedescription pid process target process PID 2124 wrote to memory of 2556 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe CasPol.exe PID 2124 wrote to memory of 2556 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe CasPol.exe PID 2124 wrote to memory of 2556 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe CasPol.exe PID 2124 wrote to memory of 2556 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe CasPol.exe PID 2124 wrote to memory of 2556 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe CasPol.exe PID 2124 wrote to memory of 2556 2124 87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe CasPol.exe PID 3064 wrote to memory of 1688 3064 Explorer.EXE ipconfig.exe PID 3064 wrote to memory of 1688 3064 Explorer.EXE ipconfig.exe PID 3064 wrote to memory of 1688 3064 Explorer.EXE ipconfig.exe PID 1688 wrote to memory of 3336 1688 ipconfig.exe Firefox.exe PID 1688 wrote to memory of 3336 1688 ipconfig.exe Firefox.exe PID 1688 wrote to memory of 3336 1688 ipconfig.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe"C:\Users\Admin\AppData\Local\Temp\87a7b708cf5f194568ce728a77c5778078720d6ff6346ea269f0a5427398ad60.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1688-183-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-179-0x0000000000B00000-0x0000000000C95000-memory.dmpFilesize
1.6MB
-
memory/1688-203-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-202-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-162-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-201-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-200-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-199-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-164-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-197-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-196-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-195-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-194-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-193-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-192-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-191-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-190-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-189-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-188-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-186-0x0000000000B00000-0x0000000000C95000-memory.dmpFilesize
1.6MB
-
memory/1688-181-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-172-0x0000000003150000-0x0000000003470000-memory.dmpFilesize
3.1MB
-
memory/1688-184-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-171-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-182-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-174-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-180-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-178-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-150-0x0000000000000000-mapping.dmp
-
memory/1688-151-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-152-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-163-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-154-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-156-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-157-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-176-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-158-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-159-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-160-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-161-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-177-0x0000000000650000-0x000000000067D000-memory.dmpFilesize
180KB
-
memory/1688-175-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-198-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-165-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-167-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-166-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-168-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/1688-169-0x0000000001140000-0x000000000114B000-memory.dmpFilesize
44KB
-
memory/1688-170-0x0000000000650000-0x000000000067D000-memory.dmpFilesize
180KB
-
memory/2124-120-0x0000024D2B0A0000-0x0000024D2B114000-memory.dmpFilesize
464KB
-
memory/2124-121-0x0000024D454F0000-0x0000024D45560000-memory.dmpFilesize
448KB
-
memory/2556-142-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-140-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-153-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2556-124-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-155-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/2556-149-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-148-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-147-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-146-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-145-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-122-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2556-143-0x00000000013B0000-0x0000000001547000-memory.dmpFilesize
1.6MB
-
memory/2556-123-0x00000000004012B0-mapping.dmp
-
memory/2556-141-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-125-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-126-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-138-0x0000000001550000-0x0000000001870000-memory.dmpFilesize
3.1MB
-
memory/2556-137-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-136-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-135-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-134-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-133-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-132-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-131-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2556-130-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/2556-129-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2556-127-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/3064-173-0x0000000002740000-0x0000000002817000-memory.dmpFilesize
860KB
-
memory/3064-187-0x00000000063D0000-0x0000000006518000-memory.dmpFilesize
1.3MB
-
memory/3064-185-0x00000000063D0000-0x0000000006518000-memory.dmpFilesize
1.3MB
-
memory/3064-144-0x0000000002740000-0x0000000002817000-memory.dmpFilesize
860KB