Analysis
-
max time kernel
163s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2022 15:30
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe
-
Size
326KB
-
MD5
40f024d22078235192eab316f30e5c15
-
SHA1
1a5502661d3f471421dff3f0222b2d4b70374594
-
SHA256
89f3942d0650523481efd8158b4ced2f49b41fba883983c4fd6fd94651b51a68
-
SHA512
e07ce98e7ad37b93404a91b3629c7d92185b39c7329e88dd3803f5c78c2157fbdc0fab7b5e3b28056c81eee92f8d62a64450e325d9e0224328852237ea832880
-
SSDEEP
6144:WhsAgx7hsjFbtWIzu258HK8zTygDCaq2ue7WTsT+g2EKAUcAM2q:4ch2jY429q2BOsTf2iUDMx
Malware Config
Extracted
formbook
ermr
ErOK6LFCgNIAlQmH54oaYOL/CN29Z78=
qNSdDhu/PT/1fgafDagiCSZH1SY=
wLpPOAkYS8EABl3pHGc4hNT/Q1sHBrU=
jSxRvptHkeTGl7PT0SEmaZmjqzanuA==
b91oL+2wCcpyhnd6yvF6Pg==
mr81yp1/qqZX
hy7Xsz/PU/LWHMcGL4UYJx9n3A==
KlwrHt1gouPaXaWhoQ==
ng8M320IRJL9Ptw=
8GQbOXuaWxvKnNM=
XndOL7E5sNpVUNty4d/a
rryPBBC8PybYb+2h2MF3FHGL
kEoeyERSVCYO0g==
5/P+SBDby5hO
1fYXc30/h9W7iO17
34X+YKR+wRFE
8ir/X2MlVByh5lQ1ow8=
u9ikm2UMZ7J7hpCYow==
FLI+c3clp1BNDjVAfvC2Dnw=
t21Erq8/r09wAzAJTAH3Ng==
VAg3gU1KH9uW3YIPAgc=
Gjlc09d6qurdLePSLZktDmGA1A==
MMraOD3ve5odaf+03cB3FHGL
mLRTTAycMcrHgomShQHVwfFKkGQaehvF
fpab65mlchvKnNM=
M6jUQU0omipqaUNXyvF6Pg==
S/XrNQGVvwUsSnKFyvF6Pg==
LeC0GeF2zvCosNtMx5RltjCD
Y+IGYC/XHS63wIus5n08ADN2qzanuA==
3tJus7Rc6OtWnx9y4d/a
4uSOYiXhGxumZcTLuA==
5PyP2thOiIucXaWhoQ==
6978Rw3FNTibYVQ1ow8=
3Ah90lcSVCYO0g==
V/UQWRsOOQjDye9m0cLQ
yRXcMfySzTmEhddhqljeGH8=
vWuKFZKZ48E=
8+UEda631IpZ
LUofBqVNdT/v+MXiEWm90Ape3g==
NCi29RHdDYd7hso=
i36jBdNko/HyUKg1eWYgJx9n3A==
vdblMhHYSkgDmBly4d/a
oQmZH6K31IpZ
fCBHqaFGx9OUMMuBr5GWDXXY5DAT
FDXweHcHVCYO0g==
qSQd9bd7BQavQ9NbcUT+O6e4OGsaehvF
vN98englU4HHzqi36ju/91SJ
prTUIBi6MhiXZFQ1ow8=
w008jVXdCYd7hso=
p1kghFnjD9iADog5cVDmvrDiTjk=
xLjHJFYDQL+ysdk=
6tiR9MZa9xSMXVQ1ow8=
WMzXJPGcyIrP2g==
SeI4PsQ+N/O0iMs=
+4o0lKRDsz+RUqpoBvt3FHGL
AHQG4ZsybzCo8ZlBs1jeGH8=
kIgR46ls4wiGUJZLtFjeGH8=
b/fmPTHIRhvKnNM=
lTL5XnA4eKLb4snpHXt2s/MaSVsHBrU=
psOQcAKjHxyFw0vIwrZ3FHGL
F806xNnby5hO
7t72ZXkhmSAc8xLYD4J2XXc=
Ihmk3OR96/2HSbdi
ea/NKy3VVcx7hpCYow==
ifair.ltd
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exedescription pid process target process PID 5020 set thread context of 4236 5020 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exepid process 4236 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe 4236 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exedescription pid process target process PID 5020 wrote to memory of 4236 5020 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe PID 5020 wrote to memory of 4236 5020 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe PID 5020 wrote to memory of 4236 5020 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe PID 5020 wrote to memory of 4236 5020 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe PID 5020 wrote to memory of 4236 5020 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe PID 5020 wrote to memory of 4236 5020 SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Lazy.272801.18738.11677.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4236-136-0x0000000000000000-mapping.dmp
-
memory/4236-137-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4236-138-0x0000000001330000-0x000000000167A000-memory.dmpFilesize
3.3MB
-
memory/5020-132-0x0000000000B00000-0x0000000000B58000-memory.dmpFilesize
352KB
-
memory/5020-133-0x0000000005A10000-0x0000000005FB4000-memory.dmpFilesize
5.6MB
-
memory/5020-134-0x0000000005520000-0x00000000055B2000-memory.dmpFilesize
584KB
-
memory/5020-135-0x0000000005630000-0x0000000005696000-memory.dmpFilesize
408KB