Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
BNK0002334789532_USD28,770.00.exe
Resource
win7-20220812-en
General
-
Target
BNK0002334789532_USD28,770.00.exe
-
Size
637KB
-
MD5
d7efd600d714d6d2f6b7fadc6adec0c9
-
SHA1
ba35f96a741637af1d1319074396f1bf891f13e1
-
SHA256
fe199e437de02d997427dfea4e864f386e12887c5ae16d2acc465417cd539521
-
SHA512
f4e1558763fb4527ca464c7a7f8a533e4fa0d4725e97c956b83acd2ef503a056930526c6e1eeb28263d9e6bbc820be2fc110548e0ef8cd28dc003cfccfda8f18
-
SSDEEP
12288:90zcBpbKbfzdHP/FvT9mzyK8DzVlCxlASlDAMTQu1c66XZp+:9hbbKnlJRKyKUBExjjcp
Malware Config
Extracted
formbook
uxpe
a/CzoooH+7KLDxBh
pxq/4D9rqoY0CaqhS2ZJ3MoWxcQ=
54a97EJkYRruxKJBfg==
afibyRo7bSK3cepm9suqXQ==
2kIxy7hmdVItO11ceeC9
DsTkiAgZVGD7jykdq/ZFa8oWxcQ=
euyGFrS1t1r0xKJBfg==
ANUDttiRvXoVxcknM8L7cgli
vIWhu8Bb36VDR+udD2O2cn8=
CqdCYLyzwb5fWRlX5kY=
cis/39CB6vGMg5OqTrUoWvz177Fk
tl6GKyac14QX
HMzbyJUrUh3Ao80fOcr7cgli
7yKNGCGy57KLDxBh
hlormOKMBCD8uyrMw9QkUg==
3r/fZtwBUey8xw==
vlyJEwWudUHi2g==
214r37lXtmpLQWC0snrI5gjDdR0mPOKnDA==
YS1hgtPl0lz0xKJBfg==
3pa6XND7NgJ4Y3uxqO0nPnY=
/bjdy5gsVVAf7xyXpHT7cgli
UdR+sC1vq5c0RXXFw5Y7DUt1
KZo42bxusIs5Yfm1w9QkUg==
mzfJ0kE8ZE/mjaG8FKqk
Ups8XuzCUey8xw==
bB4kayDLjgkyxKJBfg==
l3hphvgpfEcWt2o=
Btf3q3YMiGQK
/NPnq5wMiGQK
ejX9LrDS15Qr1VclcyiKPU9A4sw=
pEw+tjRj295uY+5tpKjs/SfNriQobw==
rln8Q8CrqWkM7Ka8jNmAOGE=
F9y8eIAiikcWt2o=
Lg4wXbLQ13pEL1WKXsf7cgli
yDXA2lV37iDtk7A1jntP6PG2riQobw==
1H2BmY/47kcWt2o=
EuoIWMG1t1r0xKJBfg==
yHjrpQoPC6958E/7P7Kjiy99Dg==
puuXOvucWyO8vn0=
5IojrjhcoquEUMx5oXX7cgli
TcSLIvx4op9C3YOWXcL7cgli
qhf/pptCOwChe6e8FKqk
iBC0XEz7KvWYe6W8FKqk
ZFYPRW7rt3QU
b9Jw/j9oahfqpKK8FKqk
xniJ3paCbi75xKJBfg==
womnnoYN+6qLDxBh
23wdzK8hA62LDxBh
+LCIo+gIdXwXsd10xP063MoWxcQ=
ZiZHOgOMYvN+bv61w9QkUg==
FfATQZ29uDcZymg=
HcB/rLVHvHpAFjzEw9QkUg==
kA66XyvB+vzLhEXwIFE=
PvffwKdfzdp3aXdkqIvJbAhq
cmaDo6pJl50ut6u8FKqk
MhAjtJklWhco6Hc=
wkvr4yZR4tq5KT+emmus
vpNjEMmb/g/iyw==
vpMnAtJbFCTzu4cjNbum
zFj4hWwmViz1jyL8g+ZCasoWxcQ=
DqBsh9jzAslhReJrY7UeRQ==
Fda0Pg2jDh27p6OzbMf7cgli
aQTg7NqHz9BveRrGw9QkUg==
EsybRVgWiEcWt2o=
creacionesandrea.com
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1316 set thread context of 4836 1316 BNK0002334789532_USD28,770.00.exe 90 PID 4836 set thread context of 652 4836 RegSvcs.exe 43 PID 5116 set thread context of 652 5116 control.exe 43 -
description ioc Process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1316 BNK0002334789532_USD28,770.00.exe 1316 BNK0002334789532_USD28,770.00.exe 1316 BNK0002334789532_USD28,770.00.exe 1316 BNK0002334789532_USD28,770.00.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 652 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4836 RegSvcs.exe 4836 RegSvcs.exe 4836 RegSvcs.exe 5116 control.exe 5116 control.exe 5116 control.exe 5116 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1316 BNK0002334789532_USD28,770.00.exe Token: SeDebugPrivilege 4836 RegSvcs.exe Token: SeDebugPrivilege 5116 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1444 1316 BNK0002334789532_USD28,770.00.exe 89 PID 1316 wrote to memory of 1444 1316 BNK0002334789532_USD28,770.00.exe 89 PID 1316 wrote to memory of 1444 1316 BNK0002334789532_USD28,770.00.exe 89 PID 1316 wrote to memory of 4836 1316 BNK0002334789532_USD28,770.00.exe 90 PID 1316 wrote to memory of 4836 1316 BNK0002334789532_USD28,770.00.exe 90 PID 1316 wrote to memory of 4836 1316 BNK0002334789532_USD28,770.00.exe 90 PID 1316 wrote to memory of 4836 1316 BNK0002334789532_USD28,770.00.exe 90 PID 1316 wrote to memory of 4836 1316 BNK0002334789532_USD28,770.00.exe 90 PID 1316 wrote to memory of 4836 1316 BNK0002334789532_USD28,770.00.exe 90 PID 652 wrote to memory of 5116 652 Explorer.EXE 91 PID 652 wrote to memory of 5116 652 Explorer.EXE 91 PID 652 wrote to memory of 5116 652 Explorer.EXE 91 PID 5116 wrote to memory of 4312 5116 control.exe 92 PID 5116 wrote to memory of 4312 5116 control.exe 92 PID 5116 wrote to memory of 4312 5116 control.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\BNK0002334789532_USD28,770.00.exe"C:\Users\Admin\AppData\Local\Temp\BNK0002334789532_USD28,770.00.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4312
-
-