Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-07-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe
Resource
win7-20220414-en
General
-
Target
0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe
-
Size
1.4MB
-
MD5
10bdc120c93912b9b937ad16cc7a13c9
-
SHA1
0a22badfd2f33aebe32d4689f11abbc31211d5ae
-
SHA256
dfb89b62125470adc70f0e24636633c45d0841aa8e84d09b6bab99f437e2f576
-
SHA512
6b438edf1e591f485974085959634265096a42ef6148c74fe125f622e1f9667e543952fae8ee812d02990ca2566435a44b161383c3fcb58cfe4bb65f6c58530d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
cmd.exeGetX64BTIT.exepid process 4900 cmd.exe 64 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 42 api.ipify.org 43 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\fc.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0a22badfd2f33aebe32d4689f11abbc31211d5ae.exenotepad.execmd.exepid process 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe 1308 notepad.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe 4900 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
notepad.exepid process 1308 notepad.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0a22badfd2f33aebe32d4689f11abbc31211d5ae.exedescription pid process Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: 33 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe Token: SeIncBasePriorityPrivilege 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 4900 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0a22badfd2f33aebe32d4689f11abbc31211d5ae.exedescription pid process target process PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe PID 8 wrote to memory of 1308 8 0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe"C:\Users\Admin\AppData\Local\Temp\0a22badfd2f33aebe32d4689f11abbc31211d5ae.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:64
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
28B
MD520abceaa2cf144caa76ca240048f5f14
SHA1947911503d0fa7b850f5a2903fc8c526884fa0e0
SHA2564c9cac4a6fedbc3ed47ad9c0bdb43d37740a2fb319e8aa396c801b0e6fdee9b3
SHA512531b6fd997445ced9cbf92050208410c365b33622dbd5ff531fc34fc2f1c95a01342897d2860fe733b86ff6e22d463b169a6e0a4a3c3154efeec8fa7b375c4d1