Analysis
-
max time kernel
47s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 14:28
Static task
static1
Behavioral task
behavioral1
Sample
71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe
Resource
win10v2004-20221111-en
General
-
Target
71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe
-
Size
615KB
-
MD5
f5f1fe50baeaa8103aaa723ddcbc7eb2
-
SHA1
81cae721012ae3d859210d708182bc0af4772772
-
SHA256
71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42
-
SHA512
3dae926dd42fcf73d0636a0aa80e897a5ad33553757a1108a34b773a7457bb74524a7cde2f68d2cca394bde15db84c4b7db683546b32f4354facbe5f0501329c
-
SSDEEP
12288:QJvylmTMGbO6JVWAeiwWG2zVj/b5CeK75/o3o5TP107kyLL1XXMQ:Wv2mTMGbr/zNoeqq0TaoyLJnM
Malware Config
Extracted
formbook
e7nb
PsTzh30CVEdk
lubNs/ediiAunBs=
508fP8IdRzd/
U549ZBc72VO65OOIBgw=
Zrhzpl05MNXVsnltXG7VJcZMaQ==
PHkdSJEyEOSxOwb6W0mv9ciuW+ybmQMt
uirizUluo2S80tubABs=
NSBqCst2TQsoCuPQCWrVJcZMaQ==
XgULikLb6PkeOubi
5YBDKpVGIrvCFbOc3Q==
8DbiHNWtmTAyw1YsjH/lL8TpimUu8ygl
nxj1I6Op1IGJVRbN7gpx
0KvxaFuA6cBryzDH1Lni7s9W
1rS3Dk9oxD/fRA==
eMFF9fHMPRZFILKx5WCRng==
pMxC7OGKd0jbCYRVMHnbFur1N+DU
nZzNQDhdyK5hEL2QkPhrtYVHz7k62Y0=
siXP5iXuAcxnhZBayg==
dP6jOfGxmFQDW+zPoDtnpnY=
MidVv6GxFvuwx5R5/w4=
LpZUdST377Hpy0TN7gpx
LsBbQ2sZTBNsWM+z5WCRng==
YFa4bVYH/tGjCIRk6yCVvmmvUwU=
uqThVT3iIRWG1oVNanjVJcZMaQ==
yN1dTZel57xXn0sEba7eJcZMaQ==
/1jjitFRKpyN52Imwg==
k7IxIFpTqoM4iTOtFBU=
9gOZw1XJoyAunBs=
Jr9fTH9F8Jtlz+OIBgw=
sE1gheW3Fgk2SBbN7gpx
CTK4XmN1v6Gd98qvZk95
e+rUBXFDusmiCuOIBgw=
fZHunc2mxD/fRA==
fnTXfIzBd1RpTRXN7gpx
YtGx3lYxoYE2ihunOy5lmw==
HECnR2JpQZTRbAY=
eLEkG1ry2Z9f376ekrfgSA5e
f3vbjXohEdJG4o5NAAo=
ZHfBOzJEfEvwPvPNWKsaViuskoAmmw==
SbRbTa5ZM+z+Jp9fTEt5
AaFWcbw1FJTRbAY=
aVyXNgkXUejctF0p/u3gSA5e
1irAZGGDz7vk9rR+cbvgSA5e
rwaQLi3z1ZNoyzPnFTODiQ==
X86YvV9818TpvuOIBgw=
fYzYf6jbPTkYdATucqAWViuskoAmmw==
IPoHMrvXPk3dO+qz5WCRng==
VcSSh/rDsVgy4cqd9hh3elxP3Lk62Y0=
iv7I8Zi3GPn+VyD1
E6+VFL6F++HOsmc0IJWx3tFW
nMT0kFURTw+0vjcIFCKOum61koAmmw==
RNvmXQzRLyQU6qBZTudAYGE=
vrII/zgDdFC1xETN7gpx
8qC110oD65CJVxbN7gpx
BSrg/UwN+pnkuGRGSsgzWNn6hRw=
XmaV+d+ixD/fRA==
k9Exy5USh0R5
hzYtTbRjQOrvzY5JBjZeooABDbRzmBU0
EG49W40rWxrsUCbn
0BS16ZvEAcXkvOOIBgw=
tPpwEAnSuXYOVQO+5WCRng==
/NTiWhW9+//cLMak5WCRng==
r6gKAzHwMd0T8Wc2fs0DIdg7Yf2bmQMt
SoDogHd/p2c70sOy5WCRng==
wikidesva.site
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exedescription pid process target process PID 1836 set thread context of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exepid process 1216 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exedescription pid process target process PID 1836 wrote to memory of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe PID 1836 wrote to memory of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe PID 1836 wrote to memory of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe PID 1836 wrote to memory of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe PID 1836 wrote to memory of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe PID 1836 wrote to memory of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe PID 1836 wrote to memory of 1216 1836 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe 71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe"C:\Users\Admin\AppData\Local\Temp\71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe"C:\Users\Admin\AppData\Local\Temp\71dcac38a6bf66dfc49a933ccfcf01bfce78edc276d11ac181b2924ebf0b9e42.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1216-64-0x00000000004012B0-mapping.dmp
-
memory/1216-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1216-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1216-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1216-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1216-67-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1216-68-0x0000000000970000-0x0000000000C73000-memory.dmpFilesize
3.0MB
-
memory/1836-55-0x0000000075771000-0x0000000075773000-memory.dmpFilesize
8KB
-
memory/1836-56-0x00000000004A0000-0x00000000004B8000-memory.dmpFilesize
96KB
-
memory/1836-57-0x0000000000480000-0x000000000048C000-memory.dmpFilesize
48KB
-
memory/1836-58-0x0000000007E70000-0x0000000007EF0000-memory.dmpFilesize
512KB
-
memory/1836-59-0x0000000000B50000-0x0000000000B96000-memory.dmpFilesize
280KB
-
memory/1836-54-0x0000000001220000-0x00000000012C0000-memory.dmpFilesize
640KB