Analysis
-
max time kernel
142s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 21:32
Static task
static1
Behavioral task
behavioral1
Sample
da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe
Resource
win10v2004-20220812-en
General
-
Target
da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe
-
Size
74KB
-
MD5
91d5e72aa96682eb07b15c68303a58c0
-
SHA1
165339eb7090b4f3c9b32e25f47e16c7b06d3483
-
SHA256
da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52
-
SHA512
3a22af6dcd012e02a165e74960f682dcead4ce4f2b87d01ba2e82515f14bbd5e1096c26dd1b541ccfe35a0f83e6f9c85c94bda57b9ee6fc894e1765b59865892
-
SSDEEP
1536:9KC9NWMm/YzIWkwW4k+iLWom5TqcF6NXqXvdz/lWHu1:ZQxgdWb+iLXNXqXvdz/lQg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 fixzubed.exe -
Deletes itself 1 IoCs
pid Process 1732 fixzubed.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1732 1968 da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe 28 PID 1968 wrote to memory of 1732 1968 da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe 28 PID 1968 wrote to memory of 1732 1968 da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe 28 PID 1968 wrote to memory of 1732 1968 da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe"C:\Users\Admin\AppData\Local\Temp\da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\fixzubed.exeC:\Users\Admin\AppData\Local\Temp\fixzubed.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1732
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD5ad5e1dc12da555131e60d379f61a12b4
SHA1b642efadabdcccb631010a181ba5c96117a56f0c
SHA256b21aff390f52cb23acc3f552aecc4630e2f024098dd72feeb86b82d9587bfb71
SHA512daa1b48f1823d73eefb1c1fd1f4c5e874c941c2dcea0d1e9e938e042d31d5b3b1d6dfd00d1c784d4bba1bf8e0557d0f1080f35aaa96ed6a65424c385994dd00c
-
Filesize
74KB
MD591d5e72aa96682eb07b15c68303a58c0
SHA1165339eb7090b4f3c9b32e25f47e16c7b06d3483
SHA256da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52
SHA5123a22af6dcd012e02a165e74960f682dcead4ce4f2b87d01ba2e82515f14bbd5e1096c26dd1b541ccfe35a0f83e6f9c85c94bda57b9ee6fc894e1765b59865892
-
Filesize
74KB
MD591d5e72aa96682eb07b15c68303a58c0
SHA1165339eb7090b4f3c9b32e25f47e16c7b06d3483
SHA256da27e4ff9781fc1a50fde66658049715a6cd7c37b0b425cbff7adbce8f155b52
SHA5123a22af6dcd012e02a165e74960f682dcead4ce4f2b87d01ba2e82515f14bbd5e1096c26dd1b541ccfe35a0f83e6f9c85c94bda57b9ee6fc894e1765b59865892