Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7 -
submitted
10-10-2020 11:20
Static task
static1
Behavioral task
behavioral1
Sample
3175c7553b29a8e22676a4d4bd7b0ce2.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3175c7553b29a8e22676a4d4bd7b0ce2.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
3175c7553b29a8e22676a4d4bd7b0ce2.exe
-
Size
7.6MB
-
MD5
3175c7553b29a8e22676a4d4bd7b0ce2
-
SHA1
63af951a129db06f9d5a1be781e8bb9df818da9c
-
SHA256
38a36c357a50c0f3d6ba6cbaa600507d485271ac452212850dff78f1a430f9e1
-
SHA512
d5e87b6ba9448575f4be4988999d8050b1b6218ad505484e67c1bfacae4cfb55b0166105fe53dc148d99344e8b73f4a5df8ea8d8f73ebafce798221e8cf65067
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 dllhost.exe -
resource yara_rule behavioral1/files/0x00030000000131cf-1.dat upx behavioral1/files/0x00030000000131cf-2.dat upx behavioral1/files/0x00030000000131cf-4.dat upx behavioral1/files/0x00030000000131c8-5.dat upx behavioral1/files/0x00030000000131c8-6.dat upx behavioral1/files/0x00030000000131cc-7.dat upx behavioral1/files/0x00030000000131cc-8.dat upx behavioral1/files/0x00030000000131c9-9.dat upx behavioral1/files/0x00030000000131c9-10.dat upx behavioral1/files/0x00030000000131ca-11.dat upx behavioral1/files/0x00030000000131ca-12.dat upx behavioral1/files/0x00030000000131cd-13.dat upx behavioral1/files/0x00030000000131cd-14.dat upx behavioral1/files/0x00030000000131cb-15.dat upx behavioral1/files/0x00030000000131cb-16.dat upx behavioral1/files/0x00030000000131d1-17.dat upx behavioral1/files/0x00030000000131d1-18.dat upx behavioral1/memory/1960-19-0x0000000074CE0000-0x0000000074D68000-memory.dmp upx -
Loads dropped DLL 9 IoCs
pid Process 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 1960 dllhost.exe 1960 dllhost.exe 1960 dllhost.exe 1960 dllhost.exe 1960 dllhost.exe 1960 dllhost.exe 1960 dllhost.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 myexternalip.com 9 myexternalip.com 10 myexternalip.com 14 myexternalip.com 16 myexternalip.com 18 myexternalip.com 20 myexternalip.com -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 284 wrote to memory of 1960 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 28 PID 284 wrote to memory of 1960 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 28 PID 284 wrote to memory of 1960 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 28 PID 284 wrote to memory of 1960 284 3175c7553b29a8e22676a4d4bd7b0ce2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3175c7553b29a8e22676a4d4bd7b0ce2.exe"C:\Users\Admin\AppData\Local\Temp\3175c7553b29a8e22676a4d4bd7b0ce2.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Users\Admin\AppData\Local\24d388a3\tor\dllhost.exe"C:\Users\Admin\AppData\Local\24d388a3\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960
-