Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 19:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d4241664d57cbee73958005d2d30d510_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d4241664d57cbee73958005d2d30d510_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
d4241664d57cbee73958005d2d30d510_exe32.exe
-
Size
60KB
-
MD5
d4241664d57cbee73958005d2d30d510
-
SHA1
0122431ddf292c8c8d3ec6bc7799f90aeb33f836
-
SHA256
96fef3c78f78f180669bdd741be26e6c0a3acb039e6a4235110fc498ad0804e4
-
SHA512
5cce198150b95fa68f71543837fccfaedee43b3c620fd1f32b797cb7837c88d7499cbecc4a182ad5c0622c4f8d484c957a38fbc2a93c10fd93024c4a4d2d35a3
-
SSDEEP
1536:Itka3G9MXSRa+ycuCRo0oxNqIxSupVvIZ:Qka29MXZxIZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1028 bijaweed.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 icanhazip.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1028 1912 d4241664d57cbee73958005d2d30d510_exe32.exe 83 PID 1912 wrote to memory of 1028 1912 d4241664d57cbee73958005d2d30d510_exe32.exe 83 PID 1912 wrote to memory of 1028 1912 d4241664d57cbee73958005d2d30d510_exe32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4241664d57cbee73958005d2d30d510_exe32.exe"C:\Users\Admin\AppData\Local\Temp\d4241664d57cbee73958005d2d30d510_exe32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\bijaweed.exeC:\Users\Admin\AppData\Local\Temp\bijaweed.exe2⤵
- Executes dropped EXE
PID:1028
-
Network
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request72.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request108.211.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesticanhazip.comIN AResponseicanhazip.comIN A104.18.115.97icanhazip.comIN A104.18.114.97
-
Remote address:104.18.115.97:80RequestGET / HTTP/1.1
Accept: text/*, application/*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Firefox/38.0
Host: icanhazip.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 13
Connection: keep-alive
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET
Set-Cookie: __cf_bm=pR.Mcz3eFQoXIl26YQYgXSIQvuxbqXFjDoEQY0kDfmE-1697417425-0-AcTfEoDPkj+DXUKGp45P0v2oeX0/TwLzabMlgf5oVeVF/vtRstLfemxSfBMFPzFpz4QlKgsiLg6MRgpga23VYlo=; path=/; expires=Mon, 16-Oct-23 01:20:25 GMT; domain=.icanhazip.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 816c4ebd3f396681-AMS
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.115.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.173.189.20.in-addr.arpaIN PTRResponse
-
457 B 718 B 6 4
HTTP Request
GET http://icanhazip.com/HTTP Response
200 -
156 B 3
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
208 B 4
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
72.32.126.40.in-addr.arpa
-
74 B 145 B 1 1
DNS Request
108.211.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
59 B 91 B 1 1
DNS Request
icanhazip.com
DNS Response
104.18.115.97104.18.114.97
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
97.115.18.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.173.189.20.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD582d96254aa987cb34f5678b31e8f8220
SHA175a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a
SHA2564f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531
SHA5127ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252
-
Filesize
60KB
MD582d96254aa987cb34f5678b31e8f8220
SHA175a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a
SHA2564f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531
SHA5127ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252