Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
10-10-2020 11:20
Static task
static1
Behavioral task
behavioral1
Sample
3175c7553b29a8e22676a4d4bd7b0ce2.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3175c7553b29a8e22676a4d4bd7b0ce2.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
3175c7553b29a8e22676a4d4bd7b0ce2.exe
-
Size
7.6MB
-
MD5
3175c7553b29a8e22676a4d4bd7b0ce2
-
SHA1
63af951a129db06f9d5a1be781e8bb9df818da9c
-
SHA256
38a36c357a50c0f3d6ba6cbaa600507d485271ac452212850dff78f1a430f9e1
-
SHA512
d5e87b6ba9448575f4be4988999d8050b1b6218ad505484e67c1bfacae4cfb55b0166105fe53dc148d99344e8b73f4a5df8ea8d8f73ebafce798221e8cf65067
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 dllhost.exe -
resource yara_rule behavioral2/files/0x000100000001ad3c-6.dat upx behavioral2/files/0x000100000001ad3c-7.dat upx behavioral2/files/0x000100000001ad36-8.dat upx behavioral2/files/0x000100000001ad39-10.dat upx behavioral2/files/0x000100000001ad3a-11.dat upx behavioral2/files/0x000100000001ad39-12.dat upx behavioral2/files/0x000100000001ad3a-14.dat upx behavioral2/files/0x000100000001ad3d-13.dat upx behavioral2/files/0x000100000001ad3d-15.dat upx behavioral2/files/0x000100000001ad37-9.dat upx behavioral2/files/0x000100000001ad37-16.dat upx behavioral2/files/0x000100000001ad3b-18.dat upx behavioral2/files/0x000100000001ad3b-19.dat upx behavioral2/files/0x000100000001ad36-20.dat upx behavioral2/files/0x000100000001ad36-21.dat upx behavioral2/files/0x000100000001ad38-17.dat upx behavioral2/files/0x000100000001ad38-22.dat upx behavioral2/memory/1640-23-0x00000000737C0000-0x0000000073848000-memory.dmp upx -
Loads dropped DLL 8 IoCs
pid Process 1640 dllhost.exe 1640 dllhost.exe 1640 dllhost.exe 1640 dllhost.exe 1640 dllhost.exe 1640 dllhost.exe 1640 dllhost.exe 1640 dllhost.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 myexternalip.com 17 myexternalip.com 18 myexternalip.com 23 myexternalip.com 26 myexternalip.com 27 myexternalip.com 29 myexternalip.com -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1640 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 74 PID 3888 wrote to memory of 1640 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 74 PID 3888 wrote to memory of 1640 3888 3175c7553b29a8e22676a4d4bd7b0ce2.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\3175c7553b29a8e22676a4d4bd7b0ce2.exe"C:\Users\Admin\AppData\Local\Temp\3175c7553b29a8e22676a4d4bd7b0ce2.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\24d388a3\tor\dllhost.exe"C:\Users\Admin\AppData\Local\24d388a3\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
-