Analysis
-
max time kernel
64s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
07-09-2023 22:50
Static task
static1
Behavioral task
behavioral1
Sample
d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe
Resource
win10-20230831-en
General
-
Target
d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe
-
Size
2.4MB
-
MD5
708845c87ffabe9b8c59501511640be7
-
SHA1
a72747b1d9b00a2a33085ad49d25976c1ecc2311
-
SHA256
d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc
-
SHA512
1538af2ae8db0b49d505c5bffcf658c5cd7e9d41eef397a9d81ea681db6e206a2e15f69d3dca6b6d04004b945ea64bde40b7f3bb9574ae17c0342ac78db25f6f
-
SSDEEP
49152:huxIPf1+yc55pMLPTVcTI4lMzoBq/lFQjYSgOUGhbIzhirApV5:oUf655a6TLeoBq/lFQjYSgOUGhbIzhiI
Malware Config
Extracted
aresloader
http://193.233.134.57
Signatures
-
AresLoader
AresLoader is a loader and downloader written in C++.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ipinfo.io 2 ipinfo.io -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 616 d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 616 wrote to memory of 3608 616 d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe 69 PID 616 wrote to memory of 3608 616 d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe 69 PID 616 wrote to memory of 3608 616 d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe 69 PID 3608 wrote to memory of 3644 3608 cmd.exe 71 PID 3608 wrote to memory of 3644 3608 cmd.exe 71 PID 3608 wrote to memory of 3644 3608 cmd.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe"C:\Users\Admin\AppData\Local\Temp\d9bf9211b0f25e94387aefe0dcb6a982b8df57abeb485df14e01752c7d340bfc.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c tzutil /g2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\tzutil.exetzutil /g3⤵PID:3644
-
-