Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 10:57
Static task
static1
Behavioral task
behavioral1
Sample
01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe
Resource
win7-20220901-en
General
-
Target
01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe
-
Size
815KB
-
MD5
d0c93e0d31223227c2fc2c0fcaaedc55
-
SHA1
da95e18dc3d6e7ac2cf4cd5d5921f26b4a5ee7f2
-
SHA256
01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7
-
SHA512
6578f8268f52b8aee586db59e1000b4ded52fb84f8c9b45e44112306469217c9467a8abc3002124f4e1ea6f02ba220276b90972f953fcb0883c771dde1ab8376
-
SSDEEP
12288:rSWjCds6ggCGMqJPdmqnHaGg2R31UQjTYTSIg95lvTHRyoY:Hugf+VnHadk1Uu0TSIgvpjRpY
Malware Config
Extracted
formbook
bmr1
q05YNsJC4MpYLGAf4A==
6KUzKCvwX0fwzrFQXvlucw==
KA4ZibW1w+hWN5Q=
TfgNq18tIWtsM7h+DexncQ==
zspNqjUKBdJVHTkiMMXJYeF7G53bVvMPoA==
hopQr+b8KzPIbMWvw0Yxir6cyw==
2thmt+17FR/MVsakbM/+w3xGOhopJw==
5gO5gfA6jwna/4FNSPqrvvHyr2A=
kqtr0wr9KaOXVMyDDexncQ==
PNldyz0Boa5cLGAf4A==
Gysor7fqabd0UzTwWp3Zir6cyw==
pMRgV18gtLorB21prX4=
ukpf+vu2u+hWN5Q=
pcS/rO+KmPMj69G9cMHnoSEm59cbIQ==
4fWGzv347bFNDYJeeIHKG5co
WXlRyM2Yn+4Ab1EgRAFHWdGDCzf1
ZPoM+2U1cwMzteOBsHY=
o8jQoNron4sT3A/KomE=
7QX8tTpv/A+YKw==
wFvmV8SY/A+YKw==
95ZJuruBovPziXkgyca4
DMhVqQXTdWLZcWM3IVNtZg==
Fya6G31VF/eHQ+OBsHY=
Q1AMfbPC2yU1IZV9q4C8vvHyr2A=
fRtdZZssSsG3s6Z7
bxBFLS8FnGv/bdOdDdjmfHz9ww==
0YG+jc1b/A+YKw==
lRliT3IEEDJ4ZoZ8a+7meQ==
dI7SuWbu40M=
Z4oXeMBk6sdDMow=
h5BX2BodM4ChJyEJXWhZEIlmBBTw
cYNHnMHSDHNoFn5XDexncQ==
U4uXeMXGel/Yo5F7JWy7ir6cyw==
w30JX9IHAfmEUkjMfJSh
nyYeAHdAO4ibDfK6+QoHkxDjQ0L/
kRNHMSv9qT1YAOi+/YTEubWayQ==
K84SAQbaiIE2JhEBwkI87fHyr2A=
/TfyyBrkRXG3s6Z7
Xm4DxD9z/A+YKw==
Iiod8GDRqTNm
UQavJOBL1PauNg==
5gHqohpY/A+YKw==
p9NjrOfd7y00suOBsHY=
+QwD0hEcmOH9FrqKOoip
t1ynrb95ITDbVcCcYLbyyYAhz/aC86DP
nsJ4j550C9tdGUvpa9jieQ==
2UyPicBXYsG3s6Z7
JcXRsh7oFKPHNx7+VFi2w/Hyr2A=
3AT+4Rqw0TI3s+OBsHY=
0m73TYSQvcdyP7Khu0w87fHyr2A=
0tyaI3KOu9UtnY5MWuNVKWo=
SXV//PAYkeL6tJB6LnC7ir6cyw==
BZ3ZnFfRqTNm
DIiVdbFCcAQd/3FWhBPOSNDjQ0L/
PzqDVoWG2r6rM5N9histir6cyw==
QFxDG5iTNsm3s6Z7
K07iK1LZc1POTrmDDexncQ==
1WJ3D0tnnQICtizlgdNO55Ii
Y3YBWZCixOhWN5Q=
N1AaNH32m3YaLGAf4A==
2wYTDEnS7XWxVTvMfJSh
Um9jMnNrA+BtRUDMfJSh
8eqyDgzQxuhWN5Q=
JbnNV71HXsW3s6Z7
escortsforme.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exedescription pid process target process PID 960 set thread context of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exepid process 592 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exedescription pid process target process PID 960 wrote to memory of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe PID 960 wrote to memory of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe PID 960 wrote to memory of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe PID 960 wrote to memory of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe PID 960 wrote to memory of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe PID 960 wrote to memory of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe PID 960 wrote to memory of 592 960 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe 01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe"C:\Users\Admin\AppData\Local\Temp\01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe"C:\Users\Admin\AppData\Local\Temp\01ff3a6ce715226b103f3bf80bdb44737fc8bccd38119a7372d8cdcfd3b034c7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:592
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/592-64-0x00000000004012B0-mapping.dmp
-
memory/592-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/592-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/592-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/592-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/592-67-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/592-68-0x0000000000A60000-0x0000000000D63000-memory.dmpFilesize
3.0MB
-
memory/960-55-0x00000000757A1000-0x00000000757A3000-memory.dmpFilesize
8KB
-
memory/960-56-0x00000000005C0000-0x00000000005D6000-memory.dmpFilesize
88KB
-
memory/960-57-0x0000000000800000-0x000000000080E000-memory.dmpFilesize
56KB
-
memory/960-58-0x0000000005970000-0x00000000059E0000-memory.dmpFilesize
448KB
-
memory/960-59-0x0000000000A90000-0x0000000000AC4000-memory.dmpFilesize
208KB
-
memory/960-54-0x00000000000C0000-0x0000000000192000-memory.dmpFilesize
840KB