Analysis
-
max time kernel
72s -
max time network
76s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01-12-2022 14:31
Static task
static1
General
-
Target
95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe
-
Size
552KB
-
MD5
b715de27a553217c49d78c598bb21369
-
SHA1
881f25a7c5c4f20d503a60d2824ab9df0382bf7b
-
SHA256
95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf
-
SHA512
cf1ce92ebc822e4c9de9cb329f3bf5bf80430a6e7e4fdc6ecf84a06ffd818599339724d29ef85e97919c3b0183dbcd0c365b37c90660a8efb0f6e848f4850df2
-
SSDEEP
12288:gWoHX/RF7mXZF6rslyyGG8arnuTeokpcaTy+yHKoN9jq:XOjSSr3yGmzaUyRj9j
Malware Config
Extracted
formbook
tz8t
ny77rjODcxSfmMf2
Ro4c30aR3N8pqxgoKOH0nKpZ1DM=
Xz784MkvjnVyiOwsbwxpwblQv47KIw==
8E5DQ8nbaEVgDiQqlbCmBos=
n+Jwl1GgHG8xHU1BsHDG
KImMWN0zhg/fESvJ2Nc=
4NkRrZjFCmbstx7pIg==
kephKeYrhstVQqQYSObEksSLgDY=
pepRAInR/Ngl0ybL/xL+xaOJc2GUt9g=
0LcrLqfr4sQR9hDlIg==
WfSuYQ9im6fudNHAuU4qnBQwqlKg
SxQnURRzi2WtMVt/vNk=
iz4tST2moq0zPngkKg==
eLUdrzCjBM/pmw6rqF8sBRjLcc9OFtA=
+4qzyKMNHP4/6UoaVVp6VWhKbi8=
JOxXem3SKvkKf7xTTOdC9p8FMA==
anepSdQmIC6nN2795qU6Bm/qXvZ9x3a9
5k32ENdAijGAfu5OggFjy5Q=
2us845cGIIQ7LZEBArySuEk53z4=
Y48EB4G+/0vY3h9NmaVhJP9bv47KIw==
Pm2KNtUOA18U3Q50YO5TSiNMOQ==
Lez1KwZxh4cdFXv4W3EI82bjQ+bfKQ==
TSYNpS6kGOhAPngkKg==
BYo81kmcmADHtRZBsHDG
OJ6LrG/DByLxZZouKw==
IbfeBfx8vLO891tx5Z7f
viulTQNssMX3TLX2LusBJamB
WT7B+M0ycP7H6UlBsHDG
fsPnYF46cceO
m047XVC7GYIN7SNKVc1aug==
YGYf6Vyb2ry78lJd4PGPf+iJ
r/Rnj1q3QW7tng==
KNTLOflDmwqJP4IUVc1aug==
dUgttyBxwx+gbbAgYcAoow==
qf5g+YTx84OO1WzSCSbFrwtvv47KIw==
6aqYoIv2JgEIhOzx7nXEjYM=
IDqNUgE3S69we77g1ZGI2i0wqlKg
QxuAoF2m30cEWrjj
sXZT9Xi/D0Fz5UdkZfbOjsSLgDY=
/1GyS6G+SNGT
sS71s2Wln3K/fsRISNQ79p8FMA==
HGfil0GPo4fPVnnQ1ZOmDIs=
M5qiYedEOEHU3s06Mw==
CkyvP63wRjA3rNMejsA=
1z+EdGjjKqCiEEnt8mx0egDPJw==
Aa2WKrIgiO51asnxO2LR
nUIJx5/+XLYwPngkKg==
nmxpXt0amQq7lA==
IWrMWbQQXMEzPngkKg==
AG4f1YfP3NxnJFbJtkW3D8yC6D0vxfe1
NKtyPO8zQ0/fmwCuqURxJQ4v3T4=
PBaVv6vMA1ksjfA=
90wrsyVqWbt8iedKz0ZOegDPJw==
xxAI2n65F+7xK4+8wW2oesxRv47KIw==
TdKJGZP7AZib1D4VReIttA==
aZE6ST42gAAehK4flhn7UOfFG8KmB9M=
MhOaW80icUlc3VFkHecutA==
FOgCvXnjLcTQib70
dHLFfSpxfNGrAS3yYcAoow==
Qi6x5K/6/UUPUb8OR/YBJamB
7iOatrejE+7sf+8=
DcbD7McIlLUzPngkKg==
6sKlQsf/GXVTsxIRfHXEjYM=
4CSOH43UwRff8ygjm1iujQTQJA==
69t150.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exedescription pid process target process PID 3488 set thread context of 2876 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exepid process 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 2876 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 2876 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exedescription pid process Token: SeDebugPrivilege 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exedescription pid process target process PID 3488 wrote to memory of 2328 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2328 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2328 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 4696 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 4696 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 4696 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2876 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2876 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2876 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2876 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2876 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe PID 3488 wrote to memory of 2876 3488 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe 95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"2⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"2⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"C:\Users\Admin\AppData\Local\Temp\95f44db4638c9a3804bffdb3c202b3de5a503a3847606dec40996524af217faf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2876-188-0x00000000004012B0-mapping.dmp
-
memory/2876-187-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2876-189-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/2876-190-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/2876-195-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2876-197-0x0000000000FA0000-0x00000000012C0000-memory.dmpFilesize
3.1MB
-
memory/2876-196-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/3488-149-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-123-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-120-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-152-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-122-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-153-0x0000000005E50000-0x000000000634E000-memory.dmpFilesize
5.0MB
-
memory/3488-124-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-125-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-126-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-127-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-128-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-129-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-130-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-131-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-132-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-133-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-134-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-135-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-136-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-137-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-138-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-139-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-140-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-141-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-142-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-143-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-144-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-145-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-146-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-147-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-148-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-118-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-150-0x0000000000F40000-0x0000000000FCA000-memory.dmpFilesize
552KB
-
memory/3488-151-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-121-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-154-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-119-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-155-0x0000000005950000-0x00000000059E2000-memory.dmpFilesize
584KB
-
memory/3488-156-0x0000000005BA0000-0x0000000005D44000-memory.dmpFilesize
1.6MB
-
memory/3488-157-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-159-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-158-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-160-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-161-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-162-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-163-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-164-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-165-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-166-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-167-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-168-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-169-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-170-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-171-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-172-0x0000000003330000-0x000000000333A000-memory.dmpFilesize
40KB
-
memory/3488-173-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-174-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-175-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-176-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-177-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-178-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-179-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-180-0x0000000005AA0000-0x0000000005AB6000-memory.dmpFilesize
88KB
-
memory/3488-181-0x0000000005B80000-0x0000000005B8E000-memory.dmpFilesize
56KB
-
memory/3488-117-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-116-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-182-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3488-183-0x0000000008230000-0x00000000082A0000-memory.dmpFilesize
448KB
-
memory/3488-184-0x0000000008350000-0x00000000083EC000-memory.dmpFilesize
624KB
-
memory/3488-185-0x0000000008310000-0x0000000008344000-memory.dmpFilesize
208KB
-
memory/3488-186-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB