Analysis
-
max time kernel
106s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 12:40
Static task
static1
Behavioral task
behavioral1
Sample
ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe
Resource
win7-20220812-en
General
-
Target
ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe
-
Size
808KB
-
MD5
e5aec87031becb8f74adc6a244a4965c
-
SHA1
ca92401e68c6a65d863303235a018538b91e3422
-
SHA256
ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9
-
SHA512
fbd97279ae3b02bb039f09475bf6e68893a0ab7b370fae28091688d0201cc025b83ca581f507adc00251c4ec6bbb7dc3960a66ed9183ef412420ab61606b2d4b
-
SSDEEP
24576:Zr18+L74mBfNUstzouz7Wouu6YlLH03r8JN:ZrrTnUI
Malware Config
Extracted
formbook
c43g
TJbzc715oMJyvdR2QVKD7Vo0tQY7R7Ey8A==
s0SBKHqd+pu4ExyvcX8DH+EhBZk7og==
dIFcsOkaySIJIw==
nvCLvSBIvt/XA8toCA05klSmSCs=
eAuSnrNfn/zh//Q=
9gFqr+CHySIJIw==
UND1oatxstSL8/uia5b4L9sa
EE2Wu7NkmKhw6dWD/ZrV
pTc3sxUsdqBbV7mgf6U=
bOoXvKs7MlJ2sCC93H0u0w==
fYSulyhLySIJIw==
Ud0T4Sdau9HjE5WDHTLV
x1ogw5IzvNLn
a6Utc6622e7N7rKV7g3E
e8rnBl+SJgun5NdyTaaLWEbEySM=
sjRR7uGCkOl33+w=
FWLaFz7vG7RHTvemab6vBYM=
KKdNclzjyFxvW7mgf6U=
6lpaaOHCJSk=
RaGqPzng+SYHWbHDFmuS0Q==
fMRLlOMELFQ4Mtx7ITlkHlSmSCs=
4F1lEEkA7QDk6YZGUG1vI1SmSCs=
0ZUSGNl0K0yZ7nFHz3OZ2Q==
ryvdLnSiCpqGr5VZfws7LB3q1g==
r/8cydCG88d51uQ=
pNtv4c5qdYZQlyXGTvzieUMF3g==
lou1qEUxeel33+w=
HSo7N6ZiVlkncOGC
2CtgO2mM3C0QGfs=
xB+jf62v3OjzVeh605s6hcRt/5/C
Nbvru+V1an9ogzj20+YZhlSmSCs=
oinQJ2yU9H5fZAeoHnuv2w==
LnKEcVWfwwDw
H6Xar9FkcZBF1KhL857V
rC0rtc+AksfeJwnlIzvd
X42vvtek8QwLMBbKcnuP34I+8BB6Qls=
GmkOX5m4F7bBCw7F9uh1zA==
Pn0XoadMcvT6QFRBxul2zA==
p9lcfdPwVFYMZnQc9wtU86NzHalOqA==
a7W0bqq99tQbtDjgEQ==
Ez18kKQzvNLn
dKXGpTRRySIJIw==
7Tk5/ybdHrPABRGuX3jBKrNP9BB6Qls=
W52/qNPT5pq089FtYeWTOwjieaVIoVM=
i9hTitybkhzuBdNpV76vBYM=
UKHFXEzxDoWR6bmgf6U=
5WFz3BQzeOl33+w=
fitTI1P5AhbG/d+Mkg08LB3q1g==
DouUcXsUB4hZtDjgEQ==
L20YnY8oMlg5RxLlIzvd
3TZrVNFtJcMMXyXZEw==
urwV2nOG1/YCK+Q=
82uYOTjqARrfKwa2Hnuv2w==
DHmTZL2Ciul33+w=
RIyvjM4FW/2n7N58DmaBwg==
cQeEhPUfcGxMV/usj5q5kmvtcsPa
UdYPuMOM4HBYtDjgEQ==
CV1MvbFNbvD3Q0HcuTPVLB3q1g==
CVybiqZamzA1R+CEFmuS0Q==
+UiYOkj5LsTSA7mgf6U=
0CFEFVl+0fD1JQjlIzvd
vBUj4x08mr6UGfya
WaNIg79kjA0YcXsY6/EhkVSmSCs=
VLFHgMXkVUlPNA==
k-outlets.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exedescription pid process target process PID 2020 set thread context of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exepid process 1760 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exedescription pid process target process PID 2020 wrote to memory of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe PID 2020 wrote to memory of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe PID 2020 wrote to memory of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe PID 2020 wrote to memory of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe PID 2020 wrote to memory of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe PID 2020 wrote to memory of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe PID 2020 wrote to memory of 1760 2020 ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe"C:\Users\Admin\AppData\Local\Temp\ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe"C:\Users\Admin\AppData\Local\Temp\ff9cb8f0b77b8627aff748b0c47ff83e52fdcce328283191a0284a7abdd4c9c9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-