Analysis
-
max time kernel
154s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
7caa9de9c0bff975dbdecef580da6310_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7caa9de9c0bff975dbdecef580da6310_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
7caa9de9c0bff975dbdecef580da6310_exe32.exe
-
Size
39KB
-
MD5
7caa9de9c0bff975dbdecef580da6310
-
SHA1
dc93e39a0a56bfaad9e71de57c004e23acc1aff1
-
SHA256
9ab3b0f8b1c5928ed049a9b867e44ac89a532ff419267d30685b7f6ac0a7f1d9
-
SHA512
2b61c5148110e73a97f6b9ac25ae75f3d93eecd7694e9ca395bc816ebaff07def4d080a001fcaf833f78d839a831aabba22853ec53ef4953ad0ac01d15f48f18
-
SSDEEP
768:/zSJcDSWD6z3afvJc0cFOF+Mj0prJyokyWURPF8NQvUB8PAlN/mLc:/zLDSWmz3QJhcFOF+Mj0prJyokyWURP+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3944 rekgernel.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 icanhazip.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3944 5080 7caa9de9c0bff975dbdecef580da6310_exe32.exe 83 PID 5080 wrote to memory of 3944 5080 7caa9de9c0bff975dbdecef580da6310_exe32.exe 83 PID 5080 wrote to memory of 3944 5080 7caa9de9c0bff975dbdecef580da6310_exe32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\7caa9de9c0bff975dbdecef580da6310_exe32.exe"C:\Users\Admin\AppData\Local\Temp\7caa9de9c0bff975dbdecef580da6310_exe32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\rekgernel.exeC:\Users\Admin\AppData\Local\Temp\rekgernel.exe2⤵
- Executes dropped EXE
PID:3944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55f8f40e8b66f84c8a5b3e4c5ce3a024a
SHA1adc322f4da716785689fe924ff0f0465f5d6665c
SHA2566c56d4a32160b1b87675e701470a5312fa297f17707af55441f50f6a5056a575
SHA512e1349d1d40f91bfea9fe7a23a653acba39222cfb5f09b23806e9cdc77fcd715af122d0077d4dd2e1597812b964588cc8d85238b8745912abb14fa8db7cad07a8
-
Filesize
39KB
MD55f8f40e8b66f84c8a5b3e4c5ce3a024a
SHA1adc322f4da716785689fe924ff0f0465f5d6665c
SHA2566c56d4a32160b1b87675e701470a5312fa297f17707af55441f50f6a5056a575
SHA512e1349d1d40f91bfea9fe7a23a653acba39222cfb5f09b23806e9cdc77fcd715af122d0077d4dd2e1597812b964588cc8d85238b8745912abb14fa8db7cad07a8