Analysis
-
max time kernel
165s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 21:15
Static task
static1
Behavioral task
behavioral1
Sample
43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe
Resource
win10v2004-20220414-en
General
-
Target
43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe
-
Size
732KB
-
MD5
2397d55bd8c610e33200e9cc98914e42
-
SHA1
77fa9f543ec6737781339a7e78eec60a121a42fd
-
SHA256
43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128
-
SHA512
e5e4f81823a0f85a08f804c95f33f3e40aba9890aa13122d5c51be890e9170fe60776b5294a2186e2ab33d8db457ea2aea44b918ed973d644acfa7aa7d8681ff
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1568 set thread context of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82 PID 1568 wrote to memory of 3928 1568 43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe"C:\Users\Admin\AppData\Local\Temp\43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe"C:\Users\Admin\AppData\Local\Temp\43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe"2⤵PID:3928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\43f590e4937f02a69d2738df1d0e0c4e1ad43d6982a5e7cc72cad6bc15369128.exe.log
Filesize500B
MD5f09b18de068f5d3b00bf97d8c6b28542
SHA141b4356341b9ba28711ca911ae47983e26415626
SHA256e431fc364d7fb15cf7679b139ef48208190a8ac3809d8f05ad5504e8d18599a1
SHA51290b77b97c54ab2d2fe9e1a36ad124f9f9461e0facf1868ad61b34e8e0ebd05dc46ad0b160d879b457d943e2904671059cebb499e1a922e7064c027f1fb22afc0