Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/01/2023, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
get_all.exe
Resource
win7-20221111-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
get_all.exe
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
get_all.exe
-
Size
14KB
-
MD5
027f5e4fc96f33900bd2bd718523d4c8
-
SHA1
08525c94ecddc4726a51d93f38d5279b9873ea2b
-
SHA256
9a5e141df08a722f09f67875304380dd41de01c4ccaf5b40527fa1aef43512e8
-
SHA512
cf5d37a424fab8f26ff978b2cc8726783fffb54a146d19947f8ea20e2378c2810aa9676b9da50626a03741c3e66205f60ec0ed82a45b9ba526c1eda4ba3278b4
-
SSDEEP
384:Ic6IZMgwObRIHdLcO0avRHTiRfuugtNKS1f51BTl6Zkg:tjl9I9LcxgTKIBB6Zkg
Score
6/10
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ifconfig.me -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1724 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1072 ipconfig.exe 288 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1224 systeminfo.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 get_all.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2036 get_all.exe Token: SeDebugPrivilege 1932 whoami.exe Token: SeDebugPrivilege 1724 tasklist.exe Token: SeDebugPrivilege 288 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1704 2036 get_all.exe 30 PID 2036 wrote to memory of 1704 2036 get_all.exe 30 PID 2036 wrote to memory of 1704 2036 get_all.exe 30 PID 1704 wrote to memory of 1932 1704 cmd.exe 32 PID 1704 wrote to memory of 1932 1704 cmd.exe 32 PID 1704 wrote to memory of 1932 1704 cmd.exe 32 PID 2036 wrote to memory of 860 2036 get_all.exe 33 PID 2036 wrote to memory of 860 2036 get_all.exe 33 PID 2036 wrote to memory of 860 2036 get_all.exe 33 PID 860 wrote to memory of 1824 860 cmd.exe 35 PID 860 wrote to memory of 1824 860 cmd.exe 35 PID 860 wrote to memory of 1824 860 cmd.exe 35 PID 1824 wrote to memory of 740 1824 net.exe 36 PID 1824 wrote to memory of 740 1824 net.exe 36 PID 1824 wrote to memory of 740 1824 net.exe 36 PID 2036 wrote to memory of 1312 2036 get_all.exe 37 PID 2036 wrote to memory of 1312 2036 get_all.exe 37 PID 2036 wrote to memory of 1312 2036 get_all.exe 37 PID 1312 wrote to memory of 1072 1312 cmd.exe 39 PID 1312 wrote to memory of 1072 1312 cmd.exe 39 PID 1312 wrote to memory of 1072 1312 cmd.exe 39 PID 2036 wrote to memory of 1176 2036 get_all.exe 40 PID 2036 wrote to memory of 1176 2036 get_all.exe 40 PID 2036 wrote to memory of 1176 2036 get_all.exe 40 PID 1176 wrote to memory of 1724 1176 cmd.exe 42 PID 1176 wrote to memory of 1724 1176 cmd.exe 42 PID 1176 wrote to memory of 1724 1176 cmd.exe 42 PID 2036 wrote to memory of 628 2036 get_all.exe 43 PID 2036 wrote to memory of 628 2036 get_all.exe 43 PID 2036 wrote to memory of 628 2036 get_all.exe 43 PID 628 wrote to memory of 288 628 cmd.exe 45 PID 628 wrote to memory of 288 628 cmd.exe 45 PID 628 wrote to memory of 288 628 cmd.exe 45 PID 2036 wrote to memory of 1836 2036 get_all.exe 46 PID 2036 wrote to memory of 1836 2036 get_all.exe 46 PID 2036 wrote to memory of 1836 2036 get_all.exe 46 PID 1836 wrote to memory of 1880 1836 cmd.exe 48 PID 1836 wrote to memory of 1880 1836 cmd.exe 48 PID 1836 wrote to memory of 1880 1836 cmd.exe 48 PID 2036 wrote to memory of 848 2036 get_all.exe 49 PID 2036 wrote to memory of 848 2036 get_all.exe 49 PID 2036 wrote to memory of 848 2036 get_all.exe 49 PID 848 wrote to memory of 1224 848 cmd.exe 51 PID 848 wrote to memory of 1224 848 cmd.exe 51 PID 848 wrote to memory of 1224 848 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\get_all.exe"C:\Users\Admin\AppData\Local\Temp\get_all.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\cmd.exe"cmd.exe" /C whoami2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C net user2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\net.exenet user3⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user4⤵PID:740
-
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:1072
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /svc2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\tasklist.exetasklist /svc3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C netstat -ano2⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\system32\NETSTAT.EXEnetstat -ano3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C cmdkey /list2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\cmdkey.execmdkey /list3⤵PID:1880
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:1224
-
-