Analysis
-
max time kernel
130s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 05:53
Static task
static1
Behavioral task
behavioral1
Sample
ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe
Resource
win10v2004-20220812-en
General
-
Target
ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe
-
Size
39KB
-
MD5
0680245c2a3b4bf04d5dc6740d436da0
-
SHA1
7181a594d487e114857c2e087fbd8a9383b24841
-
SHA256
ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0
-
SHA512
98f5400f5d1c2afc632c08097c64c4a827514cb81aa6ef70529320235fc99c485901c174285cb5a8d0b46a613a1edd48729964299f09a10112670c456a0557ce
-
SSDEEP
768:qDlpIRfeQ7h1gy2/eqtQHgy2/eqtQSusX50:qDbIRfeugh/eqtwgh/eqttus
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1992 svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 960 set thread context of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 956 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 956 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 960 wrote to memory of 956 960 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 27 PID 956 wrote to memory of 1992 956 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 28 PID 956 wrote to memory of 1992 956 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 28 PID 956 wrote to memory of 1992 956 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 28 PID 956 wrote to memory of 1992 956 ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe"C:\Users\Admin\AppData\Local\Temp\ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe"C:\Users\Admin\AppData\Local\Temp\ae4c010beb0680a3c694cb16407578aef6240201217370defe4d764d4b9942e0.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
PID:1992
-
-