Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe
Resource
win10v2004-20220901-en
General
-
Target
21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe
-
Size
37KB
-
MD5
a1d4c487401c4d108a5c0a2f2ba53cf0
-
SHA1
1c2ffce2125179ae02a3731c80d27bcfa77e110f
-
SHA256
21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165
-
SHA512
ed1ba426ce130786ba62526452e4d6d68e41589b8a39f26a8f2fb7ef66c38f719946dbaaed0549659358f9fb0a47f09d595e59406c0619edcd39e2df8b22e164
-
SSDEEP
768:ck0S8mnXg9yKHBK28cKgmOHlcGleXLQLT2BQLrYhL:MS/XlKhKlcKgmOHlcGleXLQLT2BQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1956 adivokar.exe -
Deletes itself 1 IoCs
pid Process 1956 adivokar.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1956 2044 21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe 26 PID 2044 wrote to memory of 1956 2044 21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe 26 PID 2044 wrote to memory of 1956 2044 21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe 26 PID 2044 wrote to memory of 1956 2044 21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe"C:\Users\Admin\AppData\Local\Temp\21fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\adivokar.exeC:\Users\Admin\AppData\Local\Temp\adivokar.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD5df9394fa6f6191ef8801bddde8a1df9d
SHA11c67c1761a54e96488f87218c73eaacb410ea9d4
SHA2560b1d1e56154743e1b60aa0b581c65d1748074d58c9002139cd8d96d3b10b4a48
SHA51229bdc882f4ff0dcb39691fbf55b36e5f3239f484cda93c09cb42b5fb0e3622d907666555baf39cc08002ce310f1f0bf7d6c0aa9ff96d10d213054ab752408e6b
-
Filesize
37KB
MD5a1d4c487401c4d108a5c0a2f2ba53cf0
SHA11c2ffce2125179ae02a3731c80d27bcfa77e110f
SHA25621fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165
SHA512ed1ba426ce130786ba62526452e4d6d68e41589b8a39f26a8f2fb7ef66c38f719946dbaaed0549659358f9fb0a47f09d595e59406c0619edcd39e2df8b22e164
-
Filesize
37KB
MD5a1d4c487401c4d108a5c0a2f2ba53cf0
SHA11c2ffce2125179ae02a3731c80d27bcfa77e110f
SHA25621fc401452383bf8dedc6f3cb1c4d40d770a99bd51f60294f4a33fae3fdb5165
SHA512ed1ba426ce130786ba62526452e4d6d68e41589b8a39f26a8f2fb7ef66c38f719946dbaaed0549659358f9fb0a47f09d595e59406c0619edcd39e2df8b22e164