Analysis
-
max time kernel
49s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe
Resource
win7-20220812-en
General
-
Target
67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe
-
Size
722KB
-
MD5
5389f9758ef51d3f6963d6784423da90
-
SHA1
4ba859dd7f254f2dd6f304890c089b6dda366d42
-
SHA256
67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54
-
SHA512
8bdda2de26868d3ac392a4b2273a9bb9365abca72a1b345c87bca63a8d9913e36e37f0533e66d1794ef8b53217c8775cb6ff85d64570ca5f9722fc39127869cf
-
SSDEEP
12288:v6kdcF8I4ycMJwjgF9qgz/A5VW+HZ1BnM33302IgFJN0V3fo0cjZnbCkI:fu8I4y8jgrqoA5QUnBnG30YCoFjZnbCx
Malware Config
Extracted
formbook
0rft
ouhzmTAhN++kgdVvcoAL+ukx7FI=
b/AAsl7j+poCqvsdhQ==
geqhPAMFrNJcHSaYr8Lk
P8N3+6G7Ut/X8wc3
t/OMzJS7R93X8wc3
VwX08ydDu1/ynVc2h/2WBUKHbA==
+ekVLl+umTTBqvsdhQ==
Vcaa12iRzI3+qvsdhQ==
dDIqvVJ9I8ah7fw/Xd4=
p6Xf5u8jI0hYw8hkX9fyQMciqgvG
erJhSR5/Nmn3qvsdhQ==
STdhWvnj9qxWHJ+aQMY=
wMotTfVO6w67i3T9UHemYQ==
ERs8NVCBapjX8wc3
OfIIrnWzp9LjSR+Setj6PqYCng7M
vnh5JHz4WxNQ
iQLl01OIh7/eoT9gABSsdg==
K7Z0BcT7mTuWc3e6U7eHty7YlHt0Qw==
kEJBNFGFf16ie70=
qibJ119LdV6ie70=
XyxJCMfLUAdNbuveLXbs
ooTaApm7H4z9S8ulABSsdg==
m1EzwH39w/H+z1xzUNQ=
X5wWLtn2F74yTuClABSsdg==
tWpR5n+dQfddMSqYr8Lk
ffO9c6vnZZ5EDh+Yr8Lk
/QhLTFjOfmrkOA==
LeTcyXWRzI3+qvsdhQ==
kk5h+YyzTtzX8wc3
uPyHm1metW/vU7CnQEjps5ymZA==
T0Wj0HuIscGe7Pw/Xd4=
KeLd3f0rKV2EXe/jyL330nSL
vzwBi0hT0XrCiYSz/g730nSL
eAKyO022/FpdR6A=
Xt2bRW694Yv+qvsdhQ==
nt5zBRZ7M23X8wc3
vYegXeai1lO+JQ==
hOjPeilA56Tqwtp6X7zqSqfHmcN2QuQ=
fPHHZv0ZX0hYw8hkX9fyQMciqgvG
pJrUzV9d0rW7ir8=
AzWyvzOzO27X8wc3
VduJPGf4WxNQ
O7RuCyV174dvi09JyVTl
qeOFGdjjfjBQx0r/CWEJn9D67E8=
+8LjFEqfS6IBeao=
m9mDL1nkuFm/Iw==
61xQ9YGD0osQvAHS4hqtfg==
20ELmlVu/nPbLw==
+2gxu2KEOt/X8wc3
C4ovrbfo+7gte8vKLX4Nmly2rKSTXnbb
P8p0/K/4WxNQ
MKiZQgVI24+aePw/Xd4=
4VQp4effDUt3T+ClABSsdg==
Ulh9GYqgPufX8wc3
4J55966yQ174wYOO9j329cb2ykSz8Oo=
tBzwkS9c+5yA1s4BX+V2BaICng7M
kXuaJbrlj05gPY0cCGJ6ibDGlsN2QuQ=
OraYSf4HwR30RCuYr8Lk
SsSEEdDPoUbFqvsdhQ==
vHphXicnRQTMlQf0i57/SHw=
N/zucwH7gSpyOSyYr8Lk
Esy4Z5ixq1YqBYs3UHemYQ==
GljuexcPwONNoy9WABSsdg==
504lakurcAtO
hu1bfq94s437c6x.xyz
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exedescription pid process target process PID 856 set thread context of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exepid process 1608 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exedescription pid process target process PID 856 wrote to memory of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe PID 856 wrote to memory of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe PID 856 wrote to memory of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe PID 856 wrote to memory of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe PID 856 wrote to memory of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe PID 856 wrote to memory of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe PID 856 wrote to memory of 1608 856 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe 67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe"C:\Users\Admin\AppData\Local\Temp\67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe"C:\Users\Admin\AppData\Local\Temp\67e92bb97c0fc0b8a96b9fd2a0f55a0f82f9966f22824f4edc639b0370549a54.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-