Analysis
-
max time kernel
137s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 06:21
Static task
static1
Behavioral task
behavioral1
Sample
3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe
Resource
win7-20220901-en
General
-
Target
3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe
-
Size
445KB
-
MD5
e263de8f3ae2be138b63fcb2495512c9
-
SHA1
d2d02ff2d91e8991f37a2a721617c076467c7e27
-
SHA256
3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d
-
SHA512
bddf900dc7a55335afd4bbc62c82a19af0b6d1459007b3b9844d13442ab3ebbf9eb2a7f8b979f88aac5825b0d9a508a89d8c8ca07715dbd27e39b03745a3cc75
-
SSDEEP
12288:XouvLcC4YGInvPc0kPwnne5oa1czjH3SmYz5vcDXAhPO:XouzcC4GPc0yMnyoFItvcDwhP
Malware Config
Extracted
formbook
t5ez
v+YaDdg/udazyV4Iyw==
MXDNPIhw1/8BP0Ud2fguBRZ/8nF6wQ==
WsTRjsGfK1Wt+wjFRn9mBQ==
TrAv42rPyfBfhpI=
2FrznhJCG6bpCgm9+n/Xq0cr
phy0dqeRgaeZzcuciHGgrkeVQw==
DIYHd2O24QEB
wVbxr0eqbQZMc4xwQF1W3NdmR2Xc
ncsN3VitpSp18jvXswKeJeQKA1DW
n/FT0RVVULr7fMV0Ykb8ztU=
OET6wvfsbaGp6O2/Rn9mBQ==
2Rb8gNoGR5GEwAeUhcs=
wR8Fc7imd8/3cQeUhcs=
rMZ/VOtX0kR/yV4Iyw==
9YIUqO7RR4iL5Cffi994
03AHmeAX+2F85Cnfi994
9QbOseAK0/c4SGJW
S1EDywDiYofETA==
ivZm1wDWR2hgAEFURn9mBQ==
D2pe4DygKUJKoLidIuwJo4PiKGhyZLPc
lsi2K1iDFzR6/DpQRn9mBQ==
/zCo4+eL8kJ1yV4Iyw==
1kfBY+RBCT1m+VwZZPOVI6t8wA1HczHT
81hmC3Ca42HdKTbfi994
W4xRYXEE9PBfhpI=
siA43PTcU3xs1CPfi994
0zsdmgMSG3XVIzrfi994
pTbHWY63jr+yAhPiTwr+pWz7O4yIxw==
40Q5rOnbvvBfhpI=
WETydKdfads=
8pAcmjWaC3rtLzTfi994
FaZOEEM/hoOxRg==
4ULAPIZ512Gu5W8a0g==
jwQOo/zas9opMUVQRn9mBQ==
2TKVUoL4B4fpHjbNRn9mBQ==
2kDERo173/XeEB/Li2SKGA==
SpL+hsz60RpBxwX+i0w2wElmR2Xc
OnrLSbomEWWTvQeUhcs=
pLp4Yq2dAYU4SGJW
UXs9ZFSNhN44SGJW
1z6sHLQho6+a9ENQ47HKrkeVQw==
70IFzFKAzleiHG0ahqvDjEkUSw==
TaSBagBq5UJ8+kgFvdcFz9MeTUNHczHT
ib2enpa24QEB
81C0oAh7BHmvLoI8+QP2cjeC8nF6wQ==
8/ixkr/ovvM4SGJW
drytJ25jZp2m6PrDMyhACg==
zUjbhwt3cPFmuweUhcs=
pPZe9mWJWb/EGGHHEXX+jEw1
pP7jRswuOb8ovC3tZcZw
DEicjM21q/t27kYRBxL6y9U=
i9Ez3NII0vc4SGJW
YZ9vOVxK0R1KhR7nJ8Q=
7nXra6S24QEB
9oa3ksDptus4SGJW
e95lEZlG8jEc
Y9XSXM1DwRtMeoBA9+QBnyXt8nF6wQ==
QWOEKI3lBrQ4SGJW
qdRvL0cmBrU4SGJW
beRsKEx5zCVxyV4Iyw==
8F5azgPlvh9iXm1NxX5w
HVEX5Gqc8xUJPVJVmoepYTCDQQ==
gA4r3GvUO5ejyV4Iyw==
tfBCGkQZ42OmwsWUis1zGK49eYk=
darkchocolatebliss.com
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exeCasPol.exedescription pid process target process PID 1444 set thread context of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe PID 1716 set thread context of 1344 1716 CasPol.exe Explorer.EXE PID 1716 set thread context of 1344 1716 CasPol.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
CasPol.exepid process 1716 CasPol.exe 1716 CasPol.exe 1716 CasPol.exe 1716 CasPol.exe 1716 CasPol.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1344 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
CasPol.exepid process 1716 CasPol.exe 1716 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CasPol.exedescription pid process Token: SeDebugPrivilege 1716 CasPol.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exedescription pid process target process PID 1444 wrote to memory of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe PID 1444 wrote to memory of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe PID 1444 wrote to memory of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe PID 1444 wrote to memory of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe PID 1444 wrote to memory of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe PID 1444 wrote to memory of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe PID 1444 wrote to memory of 1716 1444 3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe CasPol.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe"C:\Users\Admin\AppData\Local\Temp\3e78df55b6fae63e9199c141df9aaa3c3ad937a654cf876406f74593385a9d5d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1344-64-0x0000000006BF0000-0x0000000006CC9000-memory.dmpFilesize
868KB
-
memory/1344-67-0x0000000006CD0000-0x0000000006D9C000-memory.dmpFilesize
816KB
-
memory/1444-55-0x0000000000620000-0x0000000000692000-memory.dmpFilesize
456KB
-
memory/1444-54-0x0000000000F50000-0x0000000000FC4000-memory.dmpFilesize
464KB
-
memory/1716-57-0x00000000004012B0-mapping.dmp
-
memory/1716-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1716-61-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1716-62-0x0000000000AA0000-0x0000000000DA3000-memory.dmpFilesize
3.0MB
-
memory/1716-63-0x0000000000120000-0x0000000000130000-memory.dmpFilesize
64KB
-
memory/1716-59-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1716-66-0x0000000000170000-0x0000000000180000-memory.dmpFilesize
64KB
-
memory/1716-56-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1716-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1716-69-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB