Analysis
-
max time kernel
43s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28-01-2021 11:56
Static task
static1
Behavioral task
behavioral1
Sample
6729001591617.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
6729001591617.bin.exe
Resource
win10v20201028
General
-
Target
6729001591617.bin.exe
-
Size
3.6MB
-
MD5
8e8f7ff797c292231959e4dd410a98da
-
SHA1
5fba19ae9f76b445d96dbca71f53113492b09d49
-
SHA256
ace9f321c9967b2ffe3bef9056c113b20040fe8831351082e186125aeea8ab0b
-
SHA512
c1e510a6d5f57eaad3b744e20145c07241b1e857e1a1832a0878cd6beedf115a40c8bfd655896d800579110687d208a59416044fdbd2811102aac334720a3c27
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 3380 GetX64BTIT.exe -
Drops startup file 2 IoCs
Processes:
DllHost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wsuj.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wsuj.exe DllHost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 api.ipify.org 19 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2292 IoCs
Processes:
6729001591617.bin.exe6729001591617.bin.exepid process 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 580 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe 3676 6729001591617.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6729001591617.bin.exedescription pid process Token: SeSecurityPrivilege 580 6729001591617.bin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6729001591617.bin.exepid process 3676 6729001591617.bin.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
6729001591617.bin.exe6729001591617.bin.exedescription pid process target process PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 580 wrote to memory of 3676 580 6729001591617.bin.exe 6729001591617.bin.exe PID 3676 wrote to memory of 3380 3676 6729001591617.bin.exe GetX64BTIT.exe PID 3676 wrote to memory of 3380 3676 6729001591617.bin.exe GetX64BTIT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6729001591617.bin.exe"C:\Users\Admin\AppData\Local\Temp\6729001591617.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\6729001591617.bin.exe"C:\Users\Admin\AppData\Local\Temp\6729001591617.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:3380
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\x64btit.txtMD5
79e20ec3b5358a2e61ad1bba05837a3a
SHA112a93002108d02d5ae7ba20c19090800449664c6
SHA2569e5608871e98d47e70b015afff534c315fc948050ff016618b6931cc356b448f
SHA512ea3333109157fc2e1688cbeced8134b25b633e3e2c991d6937093a45dcfb371f0bca1495ee216656aee76348306ceaf62074690ebf6bd05b3a2266f559048f19
-
memory/580-2-0x0000000004130000-0x00000000041AB000-memory.dmpFilesize
492KB
-
memory/580-6-0x00000000041B0000-0x000000000433E000-memory.dmpFilesize
1.6MB
-
memory/3380-10-0x0000000000000000-mapping.dmp
-
memory/3676-3-0x0000000000000000-mapping.dmp
-
memory/3676-4-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3676-7-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/3676-8-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3676-9-0x00000000025B0000-0x0000000002659000-memory.dmpFilesize
676KB