Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 02:35
Static task
static1
Behavioral task
behavioral1
Sample
d85362ebed4b1ec73421fcad1b1ad03d.exe
Resource
win7-20220812-en
General
-
Target
d85362ebed4b1ec73421fcad1b1ad03d.exe
-
Size
939KB
-
MD5
d85362ebed4b1ec73421fcad1b1ad03d
-
SHA1
70ec5402777057c0ac6cab40698380812341e325
-
SHA256
dc99d626b36e12c70bcb745c3b7894eda7d7d7c788978eb5ba17beca18e995ab
-
SHA512
df86d90a862061cf0bea7f8afa75d251be726e6326d778aa52f6e41d322238bf1341d116aa13e878d33603fc2a34d67000b11372c4cc35bd536b3b99e99c4a0c
-
SSDEEP
12288:ccr2iNUY4IWGjCRqCLg883vVB6l+Gjg34eYJPLByqzNMP1gURVrDJnR6haKnlUvV:3r1ONGjU3LgT//m9jgoeiLBI
Malware Config
Extracted
formbook
w086
F6jSz+l9QmYXguG/xUipf/6ixrik
cQZre8twfBVOOJgLenGTGA==
pG5kW2/wqwEOCVxZ
KORXeYwt7wF8J3BR
HL0ZdBMjeHet
TR57b4Yi6wJ8J3BR
fRyK2yaqeDRGHiQTTw==
RwhsqfRxABNZS59wenGTGA==
GuZaY4H4ahcWKjUdVg==
I5C4/Wyz3fglj+o=
Te5QPEu3NjZ0P58LenGTGA==
M9YJLwifZIi9pfnj2Nj/kA6+ZlU=
c/JFdRndG8f/HiQTTw==
nMmcD1UjeHet
QWR7+9Rh8/l8J3BR
9MD+BzOyI6mXtM4w6LMyEA==
WABgaYPqdJzl2TviGbdH
02OexRebqj3+U2kXhQ0=
j17M2R3/fQwFHiQTTw==
dQpReYss5/l8J3BR
tiaHq71bHDzrXWkXhQ0=
pks7Z4EmPunm2e0ZDK5F
EKYCS50qID/AL4HlVNUIg0XJdFQ=
iCibxeJa5ARNSauNiDOMmBT/
yZHHww7dJM8EHiQTTw==
HbLe2y3prvglj+o=
dVJttQWbovglj+o=
PNU9jC3aosZHn/dewVKhOvPC8tWu
flK4vRfTDsWS7U/JQQoNoDI=
SG097d7jZ8zPlv0=
jildmuNaT3ndPI4LenGTGA==
M8cbIW9BjgwJHiQTTw==
nz6k8Ydf0cxaq/c=
tnrjNokIeQz39UHiGbdH
GJD0UP/vY3uw
yE6h6o1UGTvtXWkXhQ0=
LtxFZHfxbgn95SwTWAE2Sml55w==
rJ2BASXOQZ/Hnw==
7IXl+gV8iRTfWq7mqBU=
fRpdr0gmrlN8J3BR
Pe1BOFsjeHet
VhhdBl9AL2ez
agpovx6sPPHsyhwQDvlqRWRq4A==
2HDY8QKAKT24N46HenGTGA==
KdZAoDfxvDAtDWtZ
6sJYfcmQ43FZM4Z1q3PJcaiOi0CeDw==
khBpyO0KjDxJHiQTTw==
GPZiV8d80sX++1k7R9cn58qr6A==
+sdAldR8R5jdtM4w6LMyEA==
kjRknj/6LMB070Q9NlSVDw==
7oz0SZRADjdrUaqax7S2ozCm8k+qEg==
u4LngJ/1QZ/Hnw==
rSJUnvl4giPmirwliAM7vzo=
0kSk9EsjeHet
zl6gy9h22Hx+b9TVwlbTnM6YviaYRp/FYg==
/qn8dVEjeHet
BpH1R+W9RkuBYriychlArMmp6g==
HOdOcL1wtVIbfN5E8woNoDI=
41rBwtJN2Nt4/V3DNgoNoDI=
5HGl16E9+wV8J3BR
IMUfc0PAT1eIa8e1ojuMmBT/
JM4jYwHVU/0C3y8ZDvlqRWRq4A==
1WfCyxTOQZ/Hnw==
gRRmp/tz4nFcN4BwenGTGA==
re-curve.tech
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d85362ebed4b1ec73421fcad1b1ad03d.exedescription pid process target process PID 4252 set thread context of 3716 4252 d85362ebed4b1ec73421fcad1b1ad03d.exe d85362ebed4b1ec73421fcad1b1ad03d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d85362ebed4b1ec73421fcad1b1ad03d.exepid process 3716 d85362ebed4b1ec73421fcad1b1ad03d.exe 3716 d85362ebed4b1ec73421fcad1b1ad03d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d85362ebed4b1ec73421fcad1b1ad03d.exedescription pid process target process PID 4252 wrote to memory of 3716 4252 d85362ebed4b1ec73421fcad1b1ad03d.exe d85362ebed4b1ec73421fcad1b1ad03d.exe PID 4252 wrote to memory of 3716 4252 d85362ebed4b1ec73421fcad1b1ad03d.exe d85362ebed4b1ec73421fcad1b1ad03d.exe PID 4252 wrote to memory of 3716 4252 d85362ebed4b1ec73421fcad1b1ad03d.exe d85362ebed4b1ec73421fcad1b1ad03d.exe PID 4252 wrote to memory of 3716 4252 d85362ebed4b1ec73421fcad1b1ad03d.exe d85362ebed4b1ec73421fcad1b1ad03d.exe PID 4252 wrote to memory of 3716 4252 d85362ebed4b1ec73421fcad1b1ad03d.exe d85362ebed4b1ec73421fcad1b1ad03d.exe PID 4252 wrote to memory of 3716 4252 d85362ebed4b1ec73421fcad1b1ad03d.exe d85362ebed4b1ec73421fcad1b1ad03d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d85362ebed4b1ec73421fcad1b1ad03d.exe"C:\Users\Admin\AppData\Local\Temp\d85362ebed4b1ec73421fcad1b1ad03d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\d85362ebed4b1ec73421fcad1b1ad03d.exe"C:\Users\Admin\AppData\Local\Temp\d85362ebed4b1ec73421fcad1b1ad03d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-