Analysis
-
max time kernel
167s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe
Resource
win10v2004-20220812-en
General
-
Target
847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe
-
Size
67KB
-
MD5
6d3d401da5cd65b8f0d91090c5bd0530
-
SHA1
b01c08636d82019e8f692328271b5c31a53a1703
-
SHA256
847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf
-
SHA512
0e5de4defcd5d29f69d0006273878b55ec18e1e2ee64975ad67c12c3df440c60566538f67e968c8556d36f5cd7b7092da5c3c2e7bf97cefc8dd4a4372ae8eecc
-
SSDEEP
1536:FyrTg4O69U6RbftP8qPeY++34vKW7YRfzQ4XXSbK67:0JO9aqqmY++qYRfM4XXSG67
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4852 umixbox.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 icanhazip.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4852 4948 847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe 82 PID 4948 wrote to memory of 4852 4948 847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe 82 PID 4948 wrote to memory of 4852 4948 847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe"C:\Users\Admin\AppData\Local\Temp\847fc5cbe3c96731f0023f15a027c3aac486b194201c78bdd89b6d4f578eeedf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\umixbox.exeC:\Users\Admin\AppData\Local\Temp\umixbox.exe2⤵
- Executes dropped EXE
PID:4852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5a22466b9ea38c68ab892da2396e82ce9
SHA1b12b5bd381915e94f1dbd9d1c20958981806851a
SHA25666e2edca2e0abe86ad07a5f77b4095e239236772a6397a302a138977a2325ec3
SHA512a005ffd7f63cb43e183b50f9702e692e6211ba6a76cba1be854e665a171a8a244a4f7039f2c52141d5c72db37be30f82323b53327d663dd95871127a4987dd97
-
Filesize
67KB
MD5a22466b9ea38c68ab892da2396e82ce9
SHA1b12b5bd381915e94f1dbd9d1c20958981806851a
SHA25666e2edca2e0abe86ad07a5f77b4095e239236772a6397a302a138977a2325ec3
SHA512a005ffd7f63cb43e183b50f9702e692e6211ba6a76cba1be854e665a171a8a244a4f7039f2c52141d5c72db37be30f82323b53327d663dd95871127a4987dd97