Analysis
-
max time kernel
65s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 09:34
Static task
static1
Behavioral task
behavioral1
Sample
f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe
-
Size
786KB
-
MD5
7c9d76a439b166b02a57b7844f3eaf8b
-
SHA1
3fd3ab56d920cd366ef709f227261efe8c843582
-
SHA256
f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239
-
SHA512
048bcbd394b053b2f61c544ab98b25da965c64820dbbf09c7aebf9201086cf530e106d6d458818c9e858f48d85df810c31fa5bd765825d05168818e5ef15f2fe
Score
6/10
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exedescription pid Process procid_target PID 1480 set thread context of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1156 744 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exepid Process 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exef6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exedescription pid Process Token: SeDebugPrivilege 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe Token: SeDebugPrivilege 744 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exef6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exedescription pid Process procid_target PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 1480 wrote to memory of 744 1480 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 26 PID 744 wrote to memory of 1156 744 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 28 PID 744 wrote to memory of 1156 744 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 28 PID 744 wrote to memory of 1156 744 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 28 PID 744 wrote to memory of 1156 744 f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe"C:\Users\Admin\AppData\Local\Temp\f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe"C:\Users\Admin\AppData\Local\Temp\f6fdbda19458f6eb1380e0e0aaaaf979c49221c4c2a0255d9f78cb9112bdb239.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 13403⤵
- Program crash
PID:1156
-
-