Analysis

  • max time kernel
    97s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-02-2023 20:45

General

  • Target

    hidemyip.exe

  • Size

    5.2MB

  • MD5

    977d272af1a1f2d968ebb00e82c9eecd

  • SHA1

    4ef47b68004380df44356ab79faad3610d88730f

  • SHA256

    f61bc09e2686c52ea44b49498ecd4f292c4feb65ae131bd96bea1d569e9c5959

  • SHA512

    c9506a21050bc74bb88f195d1c1f715b6a6894a0cdd8964cae9c19dd0bdfeaed0d5b3d7fec30c1c77fabd97cd2eb43cf8394c3823153e847e6334f879d894986

  • SSDEEP

    98304:Pr3ED9PrtDAgfNxVe5BmZJtskn0ZvBp3jaxDZ1VrQOqE2euzhMMuGbuIcFvG:SphfLV6IbnaBpGxdlq7euzhMMLcRG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hidemyip.exe
    "C:\Users\Admin\AppData\Local\Temp\hidemyip.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\is-2U68G.tmp\hidemyip.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2U68G.tmp\hidemyip.tmp" /SL5="$7014A,4843924,153088,C:\Users\Admin\AppData\Local\Temp\hidemyip.exe"
      2⤵
      • Executes dropped EXE
      PID:4680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-2U68G.tmp\hidemyip.tmp

    Filesize

    1.2MB

    MD5

    0d1d0d97f004b45982a6f7afdef381fa

    SHA1

    85ef34b4f4025a5487083c630c3797120e5342ab

    SHA256

    5103efab28e7b4afe033bb884290e3d581c1c87943d302781ad32b2c87a63f19

    SHA512

    30ce80594931a274c93511eb6212af2e9f41da61e0cbeb19f35f180f52aca8639144cf2cefc0bdf9500c86cc9f6075a37d3330fd205448f9f02e958c25c06a08

  • memory/2904-132-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2904-136-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB