Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-01-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
6546a7ea064c3d9f64088e019d9886f58524c335.exe
Resource
win7-20220812-en
General
-
Target
6546a7ea064c3d9f64088e019d9886f58524c335.exe
-
Size
836KB
-
MD5
8ba209a4fa3662aa0bbe28789524a293
-
SHA1
6546a7ea064c3d9f64088e019d9886f58524c335
-
SHA256
34c78648a400263531a09c99c5979b2520b7705bede0b48773cd2ec5cb88cdd7
-
SHA512
18ce206118e2bf27469afbdf275b99fc611028cb01c468405e9362725896954b5417ae7e72869b50e5489663b44a4b0bbfdeb93eb66afcf2b7ca7e4e2f4d65f4
-
SSDEEP
12288:kF1ptxzc/f9C80BNM1o3t64Vhe7VulmSb9kLON9b5Wx:mnz2fE80BS1o3t5Vs7bqVN9k
Malware Config
Extracted
formbook
g44n
t60gB4YRvsDLttd9HG4=
xck8G7COQ+g7VIpX
BQQF3mmpLPskhQ==
eLWwmzNyK6ee+nF1jDvvkxuSGA==
3tlgNOzw8BBjpNOQMnc=
nOpNEJhoU0h+00S9E1YfgA==
xcvTpljkjIyEdvhp+VcGFtJC
bZxOHr5CtzY4
rOD304X0u1DN/m7cbA==
Knixl0HJyEOOiNckwk8GFtJC
S4JMDRNTUAol
Vp9wSwNZSfY7VIpX
0Nf/zlrpmpahnM+tpkYGFtJC
joXsuHiBcVp88DHEHMA7
yN8i9ppoZYHSSaqqk6NZnQ==
4UFEMfyKhSB4UovzjdabqolwhFtMH1M=
d3RiRcXCeR8wlgjEHMA7
eMUS8PSBPCe2rPg=
LCsR0X328UuSAmlf
/keifSXopayqjLt1EWQ=
x8Hdn0pOACh11lPPYXo=
NXkuHKtxYYAXG3hA
d5dE59banPxMmA==
0vJUL/UPu1HN/m7cbA==
cG3LiYu7/OkmhQ==
kcFYNbltO4XkzzLEHMA7
c3now24l3wQX9EW8E1YfgA==
6kE4FbVNNTmvwBldAWY=
KzTXxYN5AlmUlfA=
pN03EpAPvdoG3td9HG4=
HFxFE8xVAzYdmOSoxIRGsGfPrq2RWw==
QKMj+KSybRYojwTEHMA7
PYRSDRNTUAol
OU/wwlhkGLrLFHx6Y4tNmQ==
5SOc+gRCtzY4
Wpm/fyDn4/3+CVe5E1YfgA==
dYOdeSmnq2BbpQLEHMA7
5vBBzXlHCp/yEEZBRKetUjQ52IU0yTJk
bbmih0CBPMgoE2DLXmVpeGo=
4S2wkRvbxeLo00C8WmVpeGo=
uECyFReWXAol
jNu+mzKEhkrN/m7cbA==
4gAT76Z35fIJDFm5E1YfgA==
qADJh1HW2aS+D2Q1E1YfgA==
dcvSv2utZ/AJgMdevpFTnQ==
JTfVqz447pqn6T42UST9jGfPrq2RWw==
iY+7qTKHfAfwUMO7yWj3my2YHA==
WmeZXSgwNX67nd5C2U4GFtJC
7P/CoUpIP1lWSI3ch/yAAIOwONni
5+eJT9fhjh9hv9+SMWw=
Y3Z/PQTQl7DjzUC9SmVpeGo=
EiBDCpcTF6v40SzEHMA7
P2sC6LDSgQA7VIpX
5eWOfxDRj6Pp4VDbY2VpeGo=
dsEE1oKWIEAv
Ua2MVQydVIHU0DXEHMA7
hNkQ540Z0sNCG25K
b4tOMMbN0uY5lt+32djuHPtxAw==
teuvevj8CyJw4EUsE1YfgA==
tNsZ75ZlU1WpFoCBm1RaVsvskzc=
aLsI8IQZ0uL0yNd9HG4=
RUPKsWJ0gHa5LI2Nj0P5cFDOnsZ1AC62uw==
P5f+1WAqKEOSIzw7ZA==
Mdxb0fR4Aa8Zdu8=
carolinerosenstein.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 752 set thread context of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2028 6546a7ea064c3d9f64088e019d9886f58524c335.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 752 wrote to memory of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27 PID 752 wrote to memory of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27 PID 752 wrote to memory of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27 PID 752 wrote to memory of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27 PID 752 wrote to memory of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27 PID 752 wrote to memory of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27 PID 752 wrote to memory of 2028 752 6546a7ea064c3d9f64088e019d9886f58524c335.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-