Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-07-2023 04:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Syxytor.bin.exe
Resource
win7-20230712-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Syxytor.bin.exe
-
Size
99KB
-
MD5
5ce1a24da24cf9aa8e2644e90f7fade5
-
SHA1
a4c3ba6a06c645c7c58bd614ee064657d2eaf2fb
-
SHA256
362df742f035af82ecd9892743fe717a14266a10abdb686e0bbea66ce9ad52d6
-
SHA512
49854120cf9ceffdf15c0429b393ebf8c96c77d22444917c9ca7b9ffd398065a19efd4d34193ebea93685074b5558c68f3ae999b0d36df0264ce76dd44ef42a5
-
SSDEEP
1536:8LUNLKF3SNmyI/TaqLMuNhTEorkiDBk5SsGJQ5GyKFIaW9OfYQat8gTs:gtFH/RLTTNBk5PuQ5BX8eVQ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2736 2112 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe 2112 Syxytor.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2112 Syxytor.bin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2736 2112 Syxytor.bin.exe 31 PID 2112 wrote to memory of 2736 2112 Syxytor.bin.exe 31 PID 2112 wrote to memory of 2736 2112 Syxytor.bin.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Syxytor.bin.exe"C:\Users\Admin\AppData\Local\Temp\Syxytor.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2112 -s 13282⤵
- Program crash
PID:2736
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2988