Analysis
-
max time kernel
131s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 00:54
Static task
static1
Behavioral task
behavioral1
Sample
a17248c6c5c5ffbc978d43dfa4b6a167.exe
Resource
win7-20220812-en
General
-
Target
a17248c6c5c5ffbc978d43dfa4b6a167.exe
-
Size
552KB
-
MD5
a17248c6c5c5ffbc978d43dfa4b6a167
-
SHA1
c99417cb8615416a978cc0b4c9cb90d80928457a
-
SHA256
4f6677dc3954982a155ebc120a4600225403047689acecaaab00cbed11b7f6d7
-
SHA512
ecb72869466aa1c9dafd2a75aa3dbb4cbb190bf2b141a1b6f3b91f03f78740ba7abc1492f6ed31cedd85512d08c6ad4aeb09752049ce9362bb714c1df6dfa19b
-
SSDEEP
12288:Urcq/eKxqvEm8+uqePNAx4EUUu1ovVj9jq:E/eKovE6VePCx4qvh9j
Malware Config
Extracted
formbook
b5jr
0de6wt9fDj2VzxFqyWStU2IZ
CEIlhC3/D4QckHwMOdQ=
324+OHk+LFMruPQ9L80=
052Bh/ajSEHVHMVOuQkQ
9DfC8AWAPlfh8P8=
+4Zqgb98ctfC/sT1EK31+8i9zyQ=
fkISYqdAD/gETU1glGl6ow==
muKtqNNZLlfh8P8=
qXtWc7RyEEJcdPkP
uL6XqPW6YUKi4UGNsQ==
iQT57xCknBF0qdAtV/Q88sRX8LzWzoSk
ZzYKFzTOjad8wuY=
D8Va1XR/BkMvcAxaQpofB6Og+yaT
IP7S065oQrQ/yA==
aEIWMUXk4hdw+ClvnoUBL8i9zyQ=
bjoiiSUS4sjYJPQ9L80=
+8Sk90TLmX4nbfdOuQkQ
ukEMGzCnXT/FIMz2n7T8lHIT
JzDsQuW6h3T9UQgzlGl6ow==
ugPgPem5vCmtvzE9q9bIOMN7ow==
qrKKkgGwTjYdsvQ9L80=
odywrM9tdNptAzhdlGl6ow==
XmTDRGIowKk=
aXJNTWUF3wOhHaK/bsU=
vIlgpkkw5hZuxu9Her0NPuOF7joxPQ==
pjkWbg/i/mJGjCAWAQsfdu2YrDwwNQ==
s31sbIEIn4NZ12GBIUNN5+OG7joxPQ==
5v3b6QCKUoXT4UGNsQ==
e0YNTOnOirwQR1lsZ62778i9zyQ=
1B7wNYYG50v1ea/JrcPF78i9zyQ=
tjUPNxLcquO5BroH
PQri3fOYnvvVH7Tci9gfeWMR
exT2BnlNFgJbbQ1Fut0feWMR
Xdy1pMM5J5DeGvQ9L80=
L8ijl7ZKFFAuePxmyWauvg==
8fTSB5BDOGInLvQ9L80=
m2g9MlPddV11vtP0o7A+UWU=
/cm4E62JVkgmMPQ9L80=
5Oyy/odlLVofahJmW7A+UWU=
tTr5QNejfVKv4UGNsQ==
aySGCeZoHEJcdPkP
vb1drkMc3guf0HbUfdAfeWMR
miL28jDu2jxV8Hhkx9wfeWMR
jQuerwkFthBjrOY=
NsOYyTyKFcZZ1g==
VywOZgW/V4znQnuRduQfeWMR
nzIFClVWv7CImnwMOdQ=
aGtMhyDay/O5zOgQudwfeWMR
ECDsRbYj2r+VrNz59TdXz6RP2d5+4X6z
StXFCUXl5lfh8P8=
8otIo7h7JPGe
2ua56FFQ+dqHyzyQqQ==
m9ewo6lJFcZZ1g==
MS3V6BXnbqSJ
Hppzf5I47uf/PTraDR4svWM=
voRWrfWaZQtjrOY=
VJmBiq5NFcZZ1g==
vsO4Aq5aCuh1sUg5TbA+UWU=
hAfu8NrJ/Vfh8P8=
cnpPhJVyP1fh8P8=
3bBudX8bKponusDZBSojS28gvdN+4X6z
VivzAVYiwq9QiLPOuQ==
6fbYC5BAN2g3tGTC6P8J
gH9srj0j8NrX4UGNsQ==
mushterinn.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a17248c6c5c5ffbc978d43dfa4b6a167.exedescription pid process target process PID 4912 set thread context of 5068 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a17248c6c5c5ffbc978d43dfa4b6a167.exea17248c6c5c5ffbc978d43dfa4b6a167.exepid process 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe 5068 a17248c6c5c5ffbc978d43dfa4b6a167.exe 5068 a17248c6c5c5ffbc978d43dfa4b6a167.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a17248c6c5c5ffbc978d43dfa4b6a167.exedescription pid process Token: SeDebugPrivilege 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a17248c6c5c5ffbc978d43dfa4b6a167.exedescription pid process target process PID 4912 wrote to memory of 1516 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 1516 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 1516 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 5068 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 5068 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 5068 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 5068 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 5068 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe PID 4912 wrote to memory of 5068 4912 a17248c6c5c5ffbc978d43dfa4b6a167.exe a17248c6c5c5ffbc978d43dfa4b6a167.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17248c6c5c5ffbc978d43dfa4b6a167.exe"C:\Users\Admin\AppData\Local\Temp\a17248c6c5c5ffbc978d43dfa4b6a167.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\a17248c6c5c5ffbc978d43dfa4b6a167.exe"C:\Users\Admin\AppData\Local\Temp\a17248c6c5c5ffbc978d43dfa4b6a167.exe"2⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\a17248c6c5c5ffbc978d43dfa4b6a167.exe"C:\Users\Admin\AppData\Local\Temp\a17248c6c5c5ffbc978d43dfa4b6a167.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1516-138-0x0000000000000000-mapping.dmp
-
memory/4912-132-0x0000000000200000-0x000000000028A000-memory.dmpFilesize
552KB
-
memory/4912-133-0x00000000052E0000-0x0000000005884000-memory.dmpFilesize
5.6MB
-
memory/4912-134-0x0000000004C20000-0x0000000004CB2000-memory.dmpFilesize
584KB
-
memory/4912-135-0x0000000004EE0000-0x0000000005086000-memory.dmpFilesize
1.6MB
-
memory/4912-136-0x0000000004E80000-0x0000000004E8A000-memory.dmpFilesize
40KB
-
memory/4912-137-0x0000000000BB0000-0x0000000000C4C000-memory.dmpFilesize
624KB
-
memory/5068-139-0x0000000000000000-mapping.dmp
-
memory/5068-140-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/5068-142-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/5068-143-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/5068-144-0x0000000001AE0000-0x0000000001E2A000-memory.dmpFilesize
3.3MB