Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe
Resource
win7-20220901-en
General
-
Target
6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe
-
Size
1014KB
-
MD5
82d72b9f11196d6a4c1da56621aa747f
-
SHA1
0cb896439279030d2b3660751d110c909560290f
-
SHA256
6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae
-
SHA512
dfe2a38d0ef2bd50a8df77930362b35f02414243d72692cbbd3193cbb256dc790f8961b9109fd07fbf1f59d3417c253a18c3cb88b74b78fcdbaba07da7b603e3
-
SSDEEP
24576:DibznTknEBNx+te3lcvM2wv8Hbdf3yT+L74mBfNUstzo:DwngEBOte3qvTuMdf3
Malware Config
Extracted
formbook
u2t4
is0/Kr2pwzJzsQ==
Br+Y1UJXBRwi
3xyPgizUdKz09BsETkl8og==
ze1TAoMAaDPX/7U=
UVOHbw2GAq+PuIWSsQ==
OFq93KpeAiRsF44pjf8c
UjleSFYu2ROPbM8guwc/3jgL5FIc2g==
ow7s/hPgGLjvqwpJxQRltDRE
3OpfZ+axwzJzsQ==
pL9MWhCRBLWPkHMroyxnEnVM
EkLh+4L0Zn/kqj3SzhKGlog=
7WFAPUAKqMzaOaf3h/0jUEsP5FIc2g==
Npp5j75QZShZGHHS0xKGlog=
TzqeenZDdYzTtA==
YZgC6XhkQ/MxdomLwxKGlog=
gZsaHLeQT/1Yl4FYhfAKLV/kkbg=
6jTksbcyDbLMEbkU
RlKKaAnhnksyMwR/mB9umKUWjocoa24=
oDtW4wgWu8cPx93u0AqTK2A7QzRM
JyJyIEb6tH/4mdvroC9pDnIi5FIc2g==
rpcnsB0attg=
L6ZgGyzPvzqOuw==
kaTSWyMkNxdprA==
RRg2SHb71oHCgyhSW+M=
/eLZzdHk2nTEl3KkT9gU
a0JE4nD6hbwGCicFTkl8og==
axYgwUXNm3jeBrc=
H5tKHyP3TFiTCDn8Tkl8og==
OUN5YAjiBx6kk6Cjsw==
RmQa5gKoufA7whLyTkl8og==
gNM2F7colZ/+GMs27DNR2jPf/yFG
Tgr1k0cYUgQ7NP5pFlm1+WJd
p26VU8CiZhmkk6Cjsw==
dzhYEZKIn/vR36w=
KqqRkHgVNoGaK9Ac
FwBbWuCmyew+uIWSsQ==
YuaWcoBIkCxMadQe
rPiRoTwJJE7MEbkU
3qicQvq1Oei9iSWYlBxltDRE
0KGchIn6Lw1vrA==
NiBQLc9KxXRVc5p6dqzJ2Bftr7s=
c9SNPVy5Gs27z/C1drvTSgmaJDxR
7HZADkQGI07MEbkU
KfAG3V41CA5+VrMHsAVltDRE
Aa6hkYlMgh8NlOIpjf8c
u/BhAjT3w3KsESxvhfo=
jqD0xWEQO+5PGaBNjM0F
Loh5g58O4uicscO5uQ==
Z5AhAyegmEgUnUy0aPNltDRE
RYIm3+mHeDIph/A4xFyGk2wN5FIc2g==
pfyYp0In+6rsNh/1Tkl8og==
oUdcEplGjkeJNp0pjf8c
DNT50Hw5cCBwNpHWZJGvT5o7QzRM
gERvZwdtzo6LuIWSsQ==
hD5H6YMisG1FFxxdXvkL
ucMLy18YuOddeR5yddj5Ig3EXLUCymY=
WS5E+6FZqh1Byx4c
Sz6EI2vnWnnxIehWackLiAkM5QjpsMJA
2gKHeQl6xF5NZD25xxKGlog=
Li/5+iDztmY1
dLZUFS7nBSho4Ckprilc7EsP5FIc2g==
/OI49XkPmbS7HI8pjf8c
mjYNLsY9lzIaKyhSW+M=
0pbke8L7wzJzsQ==
michellegobbi.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exedescription pid process target process PID 832 set thread context of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exepid process 580 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exedescription pid process target process PID 832 wrote to memory of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe PID 832 wrote to memory of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe PID 832 wrote to memory of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe PID 832 wrote to memory of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe PID 832 wrote to memory of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe PID 832 wrote to memory of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe PID 832 wrote to memory of 580 832 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe 6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe"C:\Users\Admin\AppData\Local\Temp\6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe"C:\Users\Admin\AppData\Local\Temp\6c0b46a75222d73d7c3b383335b4445ecbf1e4559b132dc64a291929128c04ae.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:580
-