Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
6546a7ea064c3d9f64088e019d9886f58524c335.exe
Resource
win7-20220812-en
General
-
Target
6546a7ea064c3d9f64088e019d9886f58524c335.exe
-
Size
836KB
-
MD5
8ba209a4fa3662aa0bbe28789524a293
-
SHA1
6546a7ea064c3d9f64088e019d9886f58524c335
-
SHA256
34c78648a400263531a09c99c5979b2520b7705bede0b48773cd2ec5cb88cdd7
-
SHA512
18ce206118e2bf27469afbdf275b99fc611028cb01c468405e9362725896954b5417ae7e72869b50e5489663b44a4b0bbfdeb93eb66afcf2b7ca7e4e2f4d65f4
-
SSDEEP
12288:kF1ptxzc/f9C80BNM1o3t64Vhe7VulmSb9kLON9b5Wx:mnz2fE80BS1o3t5Vs7bqVN9k
Malware Config
Extracted
formbook
g44n
t60gB4YRvsDLttd9HG4=
xck8G7COQ+g7VIpX
BQQF3mmpLPskhQ==
eLWwmzNyK6ee+nF1jDvvkxuSGA==
3tlgNOzw8BBjpNOQMnc=
nOpNEJhoU0h+00S9E1YfgA==
xcvTpljkjIyEdvhp+VcGFtJC
bZxOHr5CtzY4
rOD304X0u1DN/m7cbA==
Knixl0HJyEOOiNckwk8GFtJC
S4JMDRNTUAol
Vp9wSwNZSfY7VIpX
0Nf/zlrpmpahnM+tpkYGFtJC
joXsuHiBcVp88DHEHMA7
yN8i9ppoZYHSSaqqk6NZnQ==
4UFEMfyKhSB4UovzjdabqolwhFtMH1M=
d3RiRcXCeR8wlgjEHMA7
eMUS8PSBPCe2rPg=
LCsR0X328UuSAmlf
/keifSXopayqjLt1EWQ=
x8Hdn0pOACh11lPPYXo=
NXkuHKtxYYAXG3hA
d5dE59banPxMmA==
0vJUL/UPu1HN/m7cbA==
cG3LiYu7/OkmhQ==
kcFYNbltO4XkzzLEHMA7
c3now24l3wQX9EW8E1YfgA==
6kE4FbVNNTmvwBldAWY=
KzTXxYN5AlmUlfA=
pN03EpAPvdoG3td9HG4=
HFxFE8xVAzYdmOSoxIRGsGfPrq2RWw==
QKMj+KSybRYojwTEHMA7
PYRSDRNTUAol
OU/wwlhkGLrLFHx6Y4tNmQ==
5SOc+gRCtzY4
Wpm/fyDn4/3+CVe5E1YfgA==
dYOdeSmnq2BbpQLEHMA7
5vBBzXlHCp/yEEZBRKetUjQ52IU0yTJk
bbmih0CBPMgoE2DLXmVpeGo=
4S2wkRvbxeLo00C8WmVpeGo=
uECyFReWXAol
jNu+mzKEhkrN/m7cbA==
4gAT76Z35fIJDFm5E1YfgA==
qADJh1HW2aS+D2Q1E1YfgA==
dcvSv2utZ/AJgMdevpFTnQ==
JTfVqz447pqn6T42UST9jGfPrq2RWw==
iY+7qTKHfAfwUMO7yWj3my2YHA==
WmeZXSgwNX67nd5C2U4GFtJC
7P/CoUpIP1lWSI3ch/yAAIOwONni
5+eJT9fhjh9hv9+SMWw=
Y3Z/PQTQl7DjzUC9SmVpeGo=
EiBDCpcTF6v40SzEHMA7
P2sC6LDSgQA7VIpX
5eWOfxDRj6Pp4VDbY2VpeGo=
dsEE1oKWIEAv
Ua2MVQydVIHU0DXEHMA7
hNkQ540Z0sNCG25K
b4tOMMbN0uY5lt+32djuHPtxAw==
teuvevj8CyJw4EUsE1YfgA==
tNsZ75ZlU1WpFoCBm1RaVsvskzc=
aLsI8IQZ0uL0yNd9HG4=
RUPKsWJ0gHa5LI2Nj0P5cFDOnsZ1AC62uw==
P5f+1WAqKEOSIzw7ZA==
Mdxb0fR4Aa8Zdu8=
carolinerosenstein.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3448 set thread context of 4792 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 4792 6546a7ea064c3d9f64088e019d9886f58524c335.exe 4792 6546a7ea064c3d9f64088e019d9886f58524c335.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4316 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 91 PID 3448 wrote to memory of 4316 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 91 PID 3448 wrote to memory of 4316 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 91 PID 3448 wrote to memory of 2312 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 92 PID 3448 wrote to memory of 2312 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 92 PID 3448 wrote to memory of 2312 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 92 PID 3448 wrote to memory of 4792 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 93 PID 3448 wrote to memory of 4792 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 93 PID 3448 wrote to memory of 4792 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 93 PID 3448 wrote to memory of 4792 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 93 PID 3448 wrote to memory of 4792 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 93 PID 3448 wrote to memory of 4792 3448 6546a7ea064c3d9f64088e019d9886f58524c335.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"2⤵PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"2⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-