Analysis
-
max time kernel
57s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe
Resource
win10v2004-20221111-en
General
-
Target
984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe
-
Size
697KB
-
MD5
acc14200ecd88fb0e18ac6aacf4c32d3
-
SHA1
a8d5a6b73167bdf6a0394e8f4f244b5195f782fb
-
SHA256
984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05
-
SHA512
2ea790cb57c3f43cca57e5142f0f1bc56fe710f7cb3bfee21a3003fa23467a721abc5507f8b3af436944779a0a64f61950c543f94cebe63f2e0c02bb7e3d07f7
-
SSDEEP
12288:Orugh/PsZ1DX/VDJJc9awH9vqc3cixdzjVDn4L/ITqMZFUd:eugh/PJ4w5JtJZU/MqZd
Malware Config
Extracted
formbook
d8ax
wQDD4HkJc+vErnk=
j7vdn039QTY5Gcs43SDb8R4gwLgFCI7s
ZqPN0enMl4As
kKK00fOMq6KZmHv6kZjEiTm3l1o=
CxCTti/0Dcs5qly/AVHoTg==
5TwVtD3wcevErnk=
/ieoWNXMl4As
caK67QvHGhmiEuKpidX2RA==
Bbyy3J6D1Qw=
LV5N2gOocvpbA/OB/w==
k7k2OMNsBY67libDOi4=
wuDokhS1jLo4mA==
RVGz6anMl4As
la40BCHFwoI/rpugbdoaWQ==
XmVnfY0nNACG5si5u8Ds6F79xw==
dpyQTuytl0/bShsFIYUaHRzIL4quYwxgTA==
yvmesDDPpTSrLhf5GlvvdaCZekhAsg==
obTEXhervaSWkSbDOi4=
ClZogXcOT1DcPyvgOKJM
Drlokv/cjLo4mA==
V4oZcMaLgjLLXfXt+g==
8BRWc4dCh+vErnk=
gZs1StGIWxHCXfXt+g==
kNWGiRXrqi1iPQlc/GU8hYQ=
nJQn54uLlWECXfXt+g==
2AU1AaNCuTog/+7M7vL++nxyjAYhug==
gLTciPW1cBLCXfXt+g==
7h7ZsWhwmJQ9Yhfd
NlFTcDIRY5WSlA==
KVxtg4EkZ5y2mybDOi4=
vc7dlj8GnRU5KNelbdoaWQ==
+hol4ZAxhsDDnSbDOi4=
0tlf7fGn6GENckSlV1dqs5o=
FVb6DpNaVBG+XfXt+g==
UNsBOPIUJJ8ud24=
1SbXAalJ3GCPfjtUDDXEVg==
OV4aRNJh6jVcNvy/xcS5Kjxc
hZqaRL5W4UlWPx16GpE2ySHpekhAsg==
QmTiBn1ALazBlibDOi4=
9jToDI8w5WJ7WCyhMmU8hYQ=
ECSrOEcC+aAef2VeVSE/tjm3l1o=
0tp9JDPs5pgphEIP41zldsC8zw==
HD7IzWMMmQt4I9wzbdoaWQ==
cKdMehnTerbJqCbDOi4=
RWhnXi5ZIGqjgmQ=
0fRlIEMHSE49Yhfd
bqrQ+DHBm4g1rJSRvsLs6F79xw==
rOoQJyHHH1VnPv1O1QiiuwbYnW74
g4SVt952e2RtcD6fKWU8hYQ=
R1huOuCLWV+pfwLgOKJM
pChMES6ijLo4mA==
9yWJOJyjtdIgzoTTZrq4iDm3l1o=
utfRc/OFAD4wFdk3bdoaWQ==
fpIYx++FK5+9spOpmf8YTg==
Jt0GgpzIjLo4mA==
srzO4u1vfXUKglbgOKJM
oK5G2NiBmWz7VRH241zldsC8zw==
LzzMZHMwGtevgmQ=
DFPw/EEd4Yc9Yhfd
cL7kACe5n07ZcfTD4w==
g8QFmC3VK2KCt0mmKyw=
mtl0BPzHDEsEWf1g3yC7UQ==
bZ/RdPiCxerz56ebbdoaWQ==
ZYALGqMrqw6bCd83bdoaWQ==
linktau-roads.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exedescription pid process target process PID 1516 set thread context of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exepid process 1504 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exedescription pid process target process PID 1516 wrote to memory of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe PID 1516 wrote to memory of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe PID 1516 wrote to memory of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe PID 1516 wrote to memory of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe PID 1516 wrote to memory of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe PID 1516 wrote to memory of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe PID 1516 wrote to memory of 1504 1516 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe 984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe"C:\Users\Admin\AppData\Local\Temp\984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe"C:\Users\Admin\AppData\Local\Temp\984a9449ed9070e40a86c6b5ab4a3ae6e0df87d9b316e26db7e876942b3b2f05.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1504-64-0x00000000004012B0-mapping.dmp
-
memory/1504-60-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1504-61-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1504-63-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1504-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1504-67-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/1504-68-0x0000000000DF0000-0x00000000010F3000-memory.dmpFilesize
3.0MB
-
memory/1516-55-0x0000000075841000-0x0000000075843000-memory.dmpFilesize
8KB
-
memory/1516-56-0x0000000000220000-0x0000000000238000-memory.dmpFilesize
96KB
-
memory/1516-57-0x0000000000200000-0x000000000020C000-memory.dmpFilesize
48KB
-
memory/1516-58-0x0000000005080000-0x00000000050F0000-memory.dmpFilesize
448KB
-
memory/1516-59-0x00000000004B0000-0x00000000004E4000-memory.dmpFilesize
208KB
-
memory/1516-54-0x0000000000D30000-0x0000000000DE4000-memory.dmpFilesize
720KB