Analysis
-
max time kernel
194s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 23:42
Static task
static1
Behavioral task
behavioral1
Sample
1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe
Resource
win7-20220901-en
General
-
Target
1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe
-
Size
328KB
-
MD5
59ec68c614cbd08f061b98ee2f7558b6
-
SHA1
518e36c73b44331e89a74c651ddf64e9ad79ee10
-
SHA256
1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80
-
SHA512
9e7efd81d2cd1ffcc35d76f33b24f96ebfe459f9768ff29fce9d56877471dff8ef1dfe469b3ff045eb913cebc30a8b44d0c3cbe1b46f6fc7e7eaa5c853eea99b
-
SSDEEP
6144:ptxBKhzEHZ6pqRMVr5PdD1IQnAPJrueL9KEzbIgsfd+O2hht9lKSYS:ptLKhIZ60+VrVR/UJrueL9PbcV8jt9lH
Malware Config
Extracted
formbook
4u5a
Y9HWoINcPu0r7SSSKt4FCmk7
G/E64auYdhRQM4wZW2bcOaY=
bL57APty/StRpW49a+EdxA==
TppryJ0SoslHe8gJFVc=
HXxDShYIEcUJDahdv2nvl5Hlbp4=
EKaq5c6w0nV3WWlEqM4Www==
VM+YjE8XS1OLcH1roYF4zA==
OwK0wxmBGnq2Fg==
B1zy4bulyfY9tj9DK2eIkeYArpTt
Avj5JeA8m9girqfQ4+cZxA==
AOY4dmDFkCdX8HUJMw==
5cQUw3pPMYr07V8=
P7ZsN4/zt63AEw==
FYyVCOpB8Vl//kSkDLPo91Yy
jxwZTBp+5gcsccPxDF+K4bDG2Rpp0A==
iGx9AO58DRhZbXX9
prwVyLkAtlhSU6irmansg8wArpTt
uqa8ZPl+FFObOkdFNg==
tL4OhF22EDaEOkdFNg==
6exH76Z9o7eu/n86vgPE
rJfvmmO0I0KSOkdFNg==
fWeyPQpzFxdBSlPuAlA=
imNhpGXCQjOgCw==
KOLqYk7Qy278+j3g
A4mLyKgkynW7jZZt0F8=
380eDrCm3ApZbXX9
1k6VTs/04X8=
6yQgD+RiKrbnhr77i60lI/gyAQ==
rST4Evf891bSukI=
wYh6yzBy3wDSOkdFNg==
i0j/88JPuMOz
1t8w27cIepbAIqSh0G5dsiUnCw==
uI6hQB6EIE+bFW1woYF4zA==
BPL0Pin+82dmW/OhB0Fr5JHlbp4=
XC5/ZktMXzEnk+xGrPFSE+st
srT4c1/AacoX8F0=
zJeU2qIZ2VCSOkdFNg==
j4a8RbuBvuFZbXX9
asVC+9b7w7eu
L6UfqgNtQjOgCw==
yTgIJt0+qNUilvojOWqqBypDFg==
Ie006MzYHidZbXX9
fbVjId1kpfdZbXX9
w7z+dzqeJEZq2/A6vgPE
bkyOQjI+MYr07V8=
EODzbkTAOSJZbXX9
sZXWleMz4n7HrUI=
YuK38tZjKZ3eQJnC3jxvdM7D2Rpp0A==
VTJSAfJU7tISaHT/
d/gIXE8qLIr07V8=
F3XypWdIKor07V8=
uQaJTBhc8R4kr/I6vgPE
1T8ENSkKJLudaZZt0F8=
uc4eyKuvBidZbXX9
txCp1rM0oc4LhQHpKYJQUKKktIT3GWoNJw==
RMLQh/ZpQjOgCw==
0+Qt17zBCyNZbXX9
JC6jMCHmB77Eu/EFdap62w==
t4XGRQqC3kSB9Tpds2j0Wrg=
T7hCMhTkzX2mf4lVAQjjJOgz
DQ6VYEicGU+NFio7Lw==
PCpjzoTZU3Ol9T1coYF4zA==
DxVl5Jum/t5orqfQ4+cZxA==
OaM0F9KunPxoQUk/Nw==
needook.com
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exeRegSvcs.exeexplorer.exedescription pid process target process PID 420 set thread context of 1696 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe RegSvcs.exe PID 1696 set thread context of 772 1696 RegSvcs.exe Explorer.EXE PID 4232 set thread context of 772 4232 explorer.exe Explorer.EXE -
Processes:
explorer.exedescription ioc process Key created \Registry\User\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
RegSvcs.exeexplorer.exepid process 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 4232 explorer.exe 4232 explorer.exe 4232 explorer.exe 4232 explorer.exe 4232 explorer.exe 4232 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exeexplorer.exepid process 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 4232 explorer.exe 4232 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exeRegSvcs.exeexplorer.exedescription pid process Token: SeDebugPrivilege 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe Token: SeDebugPrivilege 1696 RegSvcs.exe Token: SeDebugPrivilege 4232 explorer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exeExplorer.EXEdescription pid process target process PID 420 wrote to memory of 1696 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe RegSvcs.exe PID 420 wrote to memory of 1696 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe RegSvcs.exe PID 420 wrote to memory of 1696 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe RegSvcs.exe PID 420 wrote to memory of 1696 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe RegSvcs.exe PID 420 wrote to memory of 1696 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe RegSvcs.exe PID 420 wrote to memory of 1696 420 1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe RegSvcs.exe PID 772 wrote to memory of 4232 772 Explorer.EXE explorer.exe PID 772 wrote to memory of 4232 772 Explorer.EXE explorer.exe PID 772 wrote to memory of 4232 772 Explorer.EXE explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe"C:\Users\Admin\AppData\Local\Temp\1546e632cb3cd6abb0497a1e941d7c1afefd3d1bc7582b63f49d948241406b80.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4232
-