Analysis
-
max time kernel
137s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe
Resource
win10v2004-20230915-en
General
-
Target
ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe
-
Size
7.2MB
-
MD5
019ff709274b8bc2c660b4842ee10f01
-
SHA1
82caf0a576b09f25387c20aebabc2b30fed5a487
-
SHA256
ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917
-
SHA512
492510301d96f49c6837a6bd7944c2658a7c90fffa7bd54944254ba3a17893386a1f1074051e33e11c31b271b76918bb13a9c71bdf361bbfcd8c70675a7a5063
-
SSDEEP
98304:uQ+JqM8NPrm9uALfprsQ9kZ4/0n5FqWWqUi1osyw6EG+77/bOtIzZw:uoM8GuAd64yFRnyTFM7/bOCz
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 jsonip.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe 3388 ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe"C:\Users\Admin\AppData\Local\Temp\ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3388