Analysis
-
max time kernel
173s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 06:25
Static task
static1
Behavioral task
behavioral1
Sample
58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe
Resource
win7-20220414-en
General
-
Target
58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe
-
Size
604KB
-
MD5
64c9a022dc31aa09718455c6a128c4a0
-
SHA1
6d90828a3b4f2b4469cb87ce4aba6f51e689bb65
-
SHA256
58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363
-
SHA512
209ba13229acbe7453c83c2e7a8b01dbeb805347d2e9a2b3fa81822bde538b4a5e013b28439315e54de7e6278a5fce1b07d98ebb27661c4c089735e38c1d659a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 2536 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 api.ipify.org 19 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exedescription pid process target process PID 2712 set thread context of 4340 2712 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exepid process 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exepid process 2712 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exedescription pid process target process PID 2712 wrote to memory of 4340 2712 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe PID 2712 wrote to memory of 4340 2712 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe PID 2712 wrote to memory of 4340 2712 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe PID 4340 wrote to memory of 2536 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe GetX64BTIT.exe PID 4340 wrote to memory of 2536 4340 58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe GetX64BTIT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe"C:\Users\Admin\AppData\Local\Temp\58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exeC:\Users\Admin\AppData\Local\Temp\58a27637b08f3e978f732e938868f4af3efcf80ac786bdbdcfb00a7a3dd39363.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:2536
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5fc4681eefc52582d7a52662b660e2081
SHA1f1bb584ef3d1eda70e2aecbe410495875f184628
SHA2569097eacf973387f33e2b46dadc706ce712c6cf9143454db8b1e16f98cd1d93f1
SHA5126d2226dc23c9d06311969eacf45fe1c771df1e62ed0ad56d74ed847dbdd80d53e8084ffb85bc5f23f18db4c0ebbc5975c775265966f204a94e9d9786f76eef40