Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe
Resource
win7-20220414-en
General
-
Target
29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe
-
Size
478KB
-
MD5
a6c3d82792c4ce7dc0695b3c013a27d3
-
SHA1
ee4319f916330ff685b2d4ccd458a1baacf71dcf
-
SHA256
29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674
-
SHA512
8584e0a1420ccb9b16fa4b983629d9920576b1f40268c8479fbecd00470b0bcd1c6a850b76684dc20fa3afe75d4693b968d3a45843e18f550e026468382241a9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 3836 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 api.ipify.org 20 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exepid process 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exepid process 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exedescription pid process target process PID 4060 wrote to memory of 3836 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe GetX64BTIT.exe PID 4060 wrote to memory of 3836 4060 29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe GetX64BTIT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe"C:\Users\Admin\AppData\Local\Temp\29c9272012b3b7ec9d72f112fe1eae5a119441f3da03d6870458176525485674.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:3836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5aa8a53b9e4da0534b59064c1ecf27b90
SHA1678c6a63601ddfec44aa47abe5079a33014fcefc
SHA256cf8880357968d60cdb21ee00e421467cb6ccc145f7b83e95950af173bebb591c
SHA512aafcb15450e4c6a9018b6642d158e7a402ee60c7e341f46c10d83dd2955894dd2537168e187fc98c6f77f60dd4455a45f8625de9bcb85adb7f7a611373be1288